{"id":21302,"date":"2020-05-15T15:43:56","date_gmt":"2020-05-15T10:13:56","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/snow-queen-cybersecurity\/21302\/"},"modified":"2020-05-15T15:43:56","modified_gmt":"2020-05-15T10:13:56","slug":"snow-queen-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/snow-queen-cybersecurity\/21302\/","title":{"rendered":"The Snow Queen: A cybersecurity report in seven stories"},"content":{"rendered":"<p>What do you think the fairy tale <em>The Snow Queen<\/em> by Danish cybersecurity specialist Hans Christian Andersen is really about? A brave girl who defeats the personification of winter and death to save her beloved friend? Think again.<\/p>\n<p>Let\u2019s get real: It\u2019s a fairly detailed account of an investigation by up-and-coming information security expert Gerda into how a certain Kai got infected with a nasty piece of sophisticated malware. This so-called fairy tale is written in the form of seven stories that clearly correspond to the investigation stages.<\/p>\n<h2>Story 1: A mirror and its fragments<\/h2>\n<p>If you\u2019ve ever read our <a href=\"https:\/\/securelist.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Securelist.com<\/a> expert blog (or any other well-done infosec research, for that matter), you probably know that investigation reports often begin with an exploration of the history of incidents. Andersen\u2019s is no different: Its first story delves into the very origins of the Kai case.<\/p>\n<p>Once upon a time (<a href=\"http:\/\/hca.gilead.org.il\/snow_que.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">according to Andersen\u2019s data<\/a>) a hobgoblin created a magic mirror that held the power to diminish people\u2019s good and beautiful qualities and magnify their bad and ugly aspects. The mirror was broken by his apprentices into billions of fragments that penetrated people\u2019s eyes and hearts yet retained the mirror\u2019s original reality-distorting properties. Some people inserted fragments into their window frames, which warped their views. Others used them as lenses for their spectacles.<\/p>\n<p>We already know from <em><a href=\"https:\/\/www.kaspersky.com\/blog\/snow-white-cryptominers\/31987\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Snow White<\/a><\/em> that storytellers often used mirrors as a metaphor for screens in a broad sense: TVs, computers, tablets, phones \u2014 you get the picture (literally).<\/p>\n<p>So, translating Andersen\u2019s words from the language of allegories into plain prose yields the following: A mighty hacker created a system with a built-in browser that distorted websites. Subsequently, his apprentices used pieces of source code to infect a huge number of Microsoft Windows devices and even augmented reality glasses.<\/p>\n<p>In fact, the phenomenon was not at all uncommon. The EternalBlue exploit leak is the ur-example. It led to the <a href=\"https:\/\/www.kaspersky.com\/blog\/five-most-notorious-cyberattacks\/24506\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">WannaCry and NotPetya<\/a> pandemics, as well as several other, less-devastating ransomware outbreaks. But we digress. Back to our fairy tale.<\/p>\n<h2>Story 2: A little boy and a little girl<\/h2>\n<p>In the second story, Andersen proceeds to a more detailed description of one of the victims and the initial infection vector. According to the available data, Kai and Gerda communicated through their adjacent attic windows (Windows-based communication!). One winter, Kai saw through his window a strange, beautiful woman wrapped in an ultrafine white tulle. This was Kai\u2019s first meeting with the hacker (hereinafter referred to by her handle, \u201cThe Snow Queen\u201d).<\/p>\n<p>A short while later, Kai felt a stabbing sensation right in his heart, and something pricking his eye. This is how Andersen describes the moment of infection. Once the malicious code had entered his heart (OS kernel) and eye (data input device), Kai\u2019s reaction to external stimuli changed radically, and all incoming information appeared distorted.<\/p>\n<p>Sometime later, he left home entirely, roping his sled to the Snow Queen\u2019s sleigh. Trusting her for some reason, Kai told the Snow Queen how he could do mental arithmetic even with fractions, and that he knew the size and population of every country. Minor details, it would seem. But as we shall see later, this is in fact precisely what the attacker was interested in.<\/p>\n<h2>Story 3: The flower garden of the woman skilled in magic<\/h2>\n<p>Gerda began her own investigation and happened to run into a woman who, for whatever reason, impeded her inquiry. To cut to the chase, we\u2019re most interested in the moment when the sorceress combed Gerda\u2019s curls, causing her to forget Kai.<\/p>\n<p>In other words, the crone somehow corrupted the data regarding the investigation. Note that her cyberweapon of choice, a comb, is already known to us. In the <a href=\"https:\/\/www.kaspersky.com\/blog\/snow-white-cryptominers\/31987\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Grimm brothers\u2019 report on the <em>Snow White<\/em> incident<\/a>, the stepmother used a similar tool to block her victim. Coincidence? Or are these incidents related?<\/p>\n<p>In any event, as in the case of Snow White, the comb-induced block was not permanent\u00a0\u2014 the data was restored and Gerda continued her investigation.<\/p>\n<p>At the end of the third part of the report, Gerda asked the flowers in the witch\u2019s garden if they had seen Kai. This is most likely a reference to the old ICQ messenger, which had a flower as its logo (and as a user status indicator). By communicating with the witch, Gerda was trying to get additional information about the incident using her contacts.<\/p>\n<h2>Story 4: The prince and the princess<\/h2>\n<p>The fourth stage of the investigation doesn\u2019t seem entirely relevant. Gerda tried to run Kai through the government database. To do that, she got to know some ravens who gave her access to a government building (the royal palace).<\/p>\n<p>Although that didn\u2019t produce any results, Gerda dutifully informed the government about the vulnerability and the insecure ravens. The prince and the princess patched the vulnerability, telling the ravens that they weren\u2019t angry with them, but not to do it again. Note that they didn\u2019t punish the birds but simply asked them to change their behavior.<\/p>\n<p>As a reward, the prince and the princess supplied Gerda with resources (a carriage, warm clothing, servants). This is a great example of how an organization should respond when researchers report a vulnerability\u00a0\u2014 let\u2019s hope the reward wasn\u2019t a one-off but became a proper <a href=\"https:\/\/www.kaspersky.com\/blog\/even-more-transparency\/19943\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">bug-bounty program<\/a>.<\/p>\n<h2>Story 5: The little robber girl<\/h2>\n<p>In this story, Gerda seemingly fell into the clutches of bandits. Andersen actually uses another allegory to explain that, having reached a dead end at the previous stage of the investigation, Gerda was forced to engage the help of forces that were, shall we say, not entirely law-abiding.<\/p>\n<p>The cybercriminals put Gerda in touch with some pigeon informants that knew exactly who was to blame for the Kai incident, as well as with a reindeer in possession of the addresses of some useful darknet contacts. The help wasn\u2019t cheap; she lost most of the resources gained in the previous story.<\/p>\n<p>So as not to undermine the young researcher\u2019s integrity, Andersen tries to describe her dealings with the criminals as unavoidable\u00a0\u2014 they robbed her first, he says, and only then, taking pity on their victim, provided information. That doesn\u2019t sound too convincing. More likely, it was a mutually beneficial arrangement.<\/p>\n<h2>Story 6: The Lapland woman and the Finnish woman<\/h2>\n<p>Next comes the final stage of collecting information needed for the investigation through the darknet contacts supplied by the bandits. The reindeer acquainted Gerda with a certain Lapland woman, who wrote on a dried cod a letter of recommendation to the next informant, a certain Finnish woman.<\/p>\n<p>The Finn, in turn, provided the address of the \u201cSnow Queen\u2019s garden\u201d\u00a0\u2014 obviously the name of the command-and-control server. A nice touch here: Having read the message, she threw the cod into a bowl of soup. She understood the practical importance of not leaving unnecessary traces, so she carefully followed <a href=\"https:\/\/en.wikipedia.org\/wiki\/Operations_security\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">OPSEC<\/a> rules. The mark of an old pro.<\/p>\n<h2>Story 7: What happened in the Snow Queen\u2019s palace, and what came of it<\/h2>\n<p>The seventh story finally explains why the Snow Queen needed Kai in the first place. He sat there rearranging the splinters of the ice, trying to spell the word \u201ceternity.\u201d Insane, right? Not at all. Read <a href=\"https:\/\/www.kaspersky.com\/blog\/mining-easy-explanation\/17768\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">this post, a primer on cryptomining<\/a>. As it explains, cryptominers essentially work by rearranging a block of information to get not just any hash, but the most \u201cbeautiful\u201d one possible.<\/p>\n<p>That is, Kai tried to arrange the pieces of information so that its hash came out as the word \u201ceternity.\u201d At this stage, it becomes clear why in the second story Andersen focused on Kai\u2019s computing power. That is exactly what the Snow Queen was after, and Kai was infected solely for cryptomining purposes. It also explains the Snow Queen\u2019s apparent obsession with all things north and cold; a high-performance mining farm requires serious cooling.<\/p>\n<p>Gerda then melted Kai\u2019s ice-crusted heart with her tears (i.e., she deleted the malicious code using various tools and regained control of the system kernel). Kai then burst into tears, meaning that he activated his built-in antivirus (previously blocked by the infected module in his kernel), and removed the second piece of malicious code, from his eye.<\/p>\n<p>The end of the report is rather weird by today\u2019s standards. Instead of providing tips for potential victims, indicators of system compromise, and other useful tidbits, Andersen rambles on about the characters\u2019 journey back home. Perhaps in the nineteenth century, that\u2019s how infosec reports wrapped things up.<\/p>\n<p>As we\u2019ve said before, fairy-tale writers are in fact the oldest cybersecurity experts in the business. The case of the Snow Queen only bolsters our claim. As described above, the tale is a detailed account of an investigation of a complex incident. We also recommend that you check out our analysis of other popular fairy tales:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/fairy-tales-red-hood\/28707\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Little Red Riding Hood and the Wolf-in-the-Middle<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/fairy-tales-seven-young-goats\/28725\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">The Seven Young Goats and multifactor authentication<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/three-little-pigs\/33796\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">The Three Little Pigs and cryptocontainer<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/operation-puss-in-boots\/28963\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">\u201cPuss in Boots\u201d APT campaign<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/snow-white-cryptominers\/31987\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Snow White, the Seven Cryptominers, and the targeted attacks<\/a><\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-top3\">\n","protected":false},"excerpt":{"rendered":"<p>Hans Christian Andersen\u2019s report on the Kai infection incident, and the investigation by infosec expert Gerda.<\/p>\n","protected":false},"author":700,"featured_media":21303,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2036,2610],"tags":[992,2838,2830,1421,2076,2720],"class_list":{"0":"post-21302","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-blockchain","10":"tag-cryptominers","11":"tag-fairy-tales","12":"tag-investigation","13":"tag-reports","14":"tag-truth"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/snow-queen-cybersecurity\/21302\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/snow-queen-cybersecurity\/16748\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/snow-queen-cybersecurity\/22307\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/snow-queen-cybersecurity\/20480\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/snow-queen-cybersecurity\/18762\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/snow-queen-cybersecurity\/22682\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/snow-queen-cybersecurity\/21632\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/snow-queen-cybersecurity\/28405\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/snow-queen-cybersecurity\/8333\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/snow-queen-cybersecurity\/35414\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/snow-queen-cybersecurity\/14906\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/snow-queen-cybersecurity\/15199\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/snow-queen-cybersecurity\/13468\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/snow-queen-cybersecurity\/23999\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/snow-queen-cybersecurity\/28321\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/snow-queen-cybersecurity\/25422\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/snow-queen-cybersecurity\/22300\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/snow-queen-cybersecurity\/27582\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/snow-queen-cybersecurity\/27417\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/truth\/","name":"truth"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/21302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=21302"}],"version-history":[{"count":0,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/21302\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/21303"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=21302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=21302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=21302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}