{"id":15442,"date":"2019-03-01T12:27:16","date_gmt":"2019-03-01T17:27:16","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/middle-earth-cybersecurity\/15442\/"},"modified":"2021-05-14T15:42:04","modified_gmt":"2021-05-14T14:42:04","slug":"middle-earth-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/middle-earth-cybersecurity\/15442\/","title":{"rendered":"Cybersecurity report from Middle-earth"},"content":{"rendered":"<p>What do Tolkien\u2019s works say? Some read them as entertainment, others as profound Christian philosophy, still others as propaganda. As for me, I see cybersecurity parables. And just because these past few years I\u2019ve been seeing them all over the place doesn\u2019t mean they\u2019re not also in Tolkien.<\/p>\n<p>After all, did you know that shortly before the outbreak of WW2, Tolkien was trained at the British Government Code and Cypher School as a cryptanalyst? That\u2019s the organization that went on to crack the German Enigma codes. Later it was rebranded as GCHQ\u00a0\u2014 the service responsible for providing signals intelligence and information assurance to the British government and armed forces. Clearly, Tolkien\u2019s combined skills as a linguist and a cryptanalyst were needed to decrypt enemy cyphers. That\u2019s definitely information security we\u2019re talking about. Therefore, in a way, Tolkien is an esteemed colleague of ours. So, let\u2019s look at his works from a cybersecurity point of view.<\/p>\n<h2>Rings of Power<\/h2>\n<p>The plot of <em>The Lord of the Rings<\/em> largely revolves around the One Ring, created by Sauron to rule the world. It controls 19 other rings, three of which are worn by Elves, seven by Dwarves, and nine by Men. The book\u2019s protagonists fear that if the One Ring returns to its creator, he will acquire frightful power and impose his will on everything.\u00a0 Sounds like fantasy, but dig a bit deeper and it becomes clear that it\u2019s actually proper sci-fi.<\/p>\n<h3>Three Rings for the Elven-kings under the sky<\/h3>\n<p>When I read Tolkien\u2019s books back in childhood, it was the story of the Elven Rings that seemed the most incomprehensible. Supposedly forged by Elven smiths, they were untouched by the Dark Lord. However, they were created using the dark arts of Sauron and thus were still bound to the One Ring. Therefore, the Elves kept their rings securely hidden as long as the One remained with Sauron. What does it matter, or so it seemed, how the rings were made if they were created for good?<\/p>\n<p>It matters a lot, as is now plain to see. Examining the situation from a modern perspective and in terms of information security, you get this:<\/p>\n<ul>\n<li>The Elves produce three devices in-house;<\/li>\n<li>The firmware for them is created using an SDK developed by Sauron;<\/li>\n<li>The address of the One Ring C&amp;C center is hard-coded into the rings;<\/li>\n<li>Knowing that, the Elves are wary of using their devices while Sauron controls the C&amp;C server.<\/li>\n<\/ul>\n<p>In other words, it\u2019s a classic <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/supply-chain\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">supply chain<\/a> attack. Only in this case, the Elves were able to identify the threat in time to take the vulnerable devices out of operation as a precaution.<\/p>\n<h3>Seven for the Dwarf-lords in their halls of stone<\/h3>\n<p>The Seven Rings were given to the Dwarf-lords by Sauron himself. The Dwarves were said to have used them to accumulate wealth. According to the book, the wearers did not succumb directly to Sauron\u2019s control, but the rings significantly increased their avarice. Therefore, by influencing their greed and anger, Sauron managed to bring about the downfall of the seven Dwarf-lords.<\/p>\n<p>Unfortunately, the Seven Rings were lost long before the events described in <em>The Lord of the Rings<\/em>, so a forensics analysis of these devices is not possible. But exploiting greed is a typical phishing technique. Cybercriminals manipulate the way device owners perceive information, which ultimately leads to their downfall. If that isn\u2019t a phishing attack, what is?<\/p>\n<h3>Nine for Mortal Men doomed to die<\/h3>\n<p>Here there is not much to explain. Sauron gave the Nine Rings to Mortal Men: kings, sorcerers, and warriors of old. The wearers became virtually immortal, invisible, and obedient to the will of Sauron. In other words, a botnet.<\/p>\n<p>Interestingly, the Nazg\u00fbl botnet seems to have had a backup control protocol; even after losing the C&amp;C server, Sauron was able to command his Ringwraiths.<\/p>\n<h3>One for the Dark Lord on his dark throne<\/h3>\n<p>Our encyclopedia describes a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/command-and-control-server-cc\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">C&amp;C server<\/a> as a server through which cybercriminals control botnets, send malicious commands, manage spyware, etc. Is the One Ring any different?<\/p>\n<p>When the One Ring is destroyed, all subordinate rings lose their power. It is possible that a periodic C&amp;C availability check was built into the firmware, plus a self-destruction mechanism to be activated on losing communication. Such behavior is very <a href=\"https:\/\/www.kaspersky.com\/blog\/pegasus-spyware\/14604\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">familiar to our cyberthreat analysts<\/a>. Cybercriminals frequently use self-destruct mechanisms to obstruct forensics.<\/p>\n<h2>One Ring to rule them all,<br>\nOne Ring to find them,<br>\nOne Ring to bring them all<br>\nand in the darkness bind them<\/h2>\n<p>Not for nothing are these closing lines engraved on the inside of the ring. Remember why the One Ring is also known as Isildur\u2019s Bane? Surrounded, Isildur put on the ring, but it slipped off his finger when he tried to cross the river and thus caused his death. Gollum also lost his \u201cprecious.\u201d And all because the inscription on the ring is an instruction. One that is seemingly incorrectly translated \u2014 or ignored entirely.<\/p>\n<p>The original engraving on the ring looks as follows:<\/p>\n<p><em>Ash nazg durbatul\u00fbk, ash nazg gimbatul,<br>\nAsh nazg thrakatul\u00fbk agh burzum-ishi krimpatul.<\/em><\/p>\n<p>The last word, <em>krimpatul<\/em>, is usually translated as \u201cbind.\u201d But binding rings together is a rather meaningless exercise. What if this is not Black Speech at all, but instead a rough transliteration of \u201ccrimping tool,\u201d a device well known to any IT specialist?<\/p>\n<p>If so, what the inscription is in fact saying is that the ring needs to be crimped. That\u2019s why it fell off Isildur\u2019s finger. So the moral of the tale is that documentation needs to be read\u00a0\u2014 and translated\u00a0\u2014 with Gollum-like devotion, however short and simple it may seem.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"glossary\">\n","protected":false},"excerpt":{"rendered":"<p>Analysis of Sauron\u2019s hacking tools implemented in the devices known as Rings of Power.<\/p>\n","protected":false},"author":700,"featured_media":15454,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1836,2361],"tags":[392,2470,76,2226,2471],"class_list":{"0":"post-15442","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-botnet","10":"tag-cc","11":"tag-phishing","12":"tag-supply-chain","13":"tag-truth"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/middle-earth-cybersecurity\/15442\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/middle-earth-cybersecurity\/15349\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/middle-earth-cybersecurity\/12913\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/middle-earth-cybersecurity\/17287\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/middle-earth-cybersecurity\/14143\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/middle-earth-cybersecurity\/17950\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/middle-earth-cybersecurity\/16981\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/middle-earth-cybersecurity\/22469\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/middle-earth-cybersecurity\/5742\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/middle-earth-cybersecurity\/25846\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/middle-earth-cybersecurity\/18656\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/middle-earth-cybersecurity\/22698\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/middle-earth-cybersecurity\/23888\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/middle-earth-cybersecurity\/18166\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/middle-earth-cybersecurity\/22222\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/middle-earth-cybersecurity\/22155\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/truth\/","name":"truth"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/15442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=15442"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/15442\/revisions"}],"predecessor-version":[{"id":22786,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/15442\/revisions\/22786"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/15454"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=15442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=15442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=15442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}