Operational Security (OPSEC): Difference between revisions
Line 148: | Line 148: | ||
'''''OPSEC Failure:''''' He accidentally uploaded his full home directory, including identifiable SSH keys and configs. Combined with historical links to other breaches, this led to conclusive attribution and arrest. | '''''OPSEC Failure:''''' He accidentally uploaded his full home directory, including identifiable SSH keys and configs. Combined with historical links to other breaches, this led to conclusive attribution and arrest. | ||
</div> | |||
<div style="border:1px solid #444; padding:1em; margin-bottom:1em; background:#1c1c1c; color:#e0e0e0;"> | |||
'''Pompompurin / BreachForums (2023):''' [https://www.justice.gov/usao-edva/united-states-v-conor-brian-fitzpatrick Conor Brian Fitzpatrick], known as "Pompompurin," operated BreachForums, a cybercrime marketplace for stolen data and hacking tools. He was arrested in March 2023 and charged with conspiracy to commit access device fraud. | |||
'''''OPSEC Failure:''''' Fitzpatrick used VPN services, but reused the same VPN IPs across personal accounts—including email, crypto, and Zoom—linking his real identity to his online activity. On June 27, 2022, he accessed BreachForums without Tor or VPN, exposing his home IP address. This, combined with long-term reuse of the "Pompompurin" alias and associated email accounts, led to his identification and arrest. | |||
</div> | </div> | ||
Revision as of 02:56, 28 May 2025
Operational Security (OPSEC)
Operational Security (OPSEC) is the discipline of hiding intentions, infrastructure, and activity to avoid detection and attribution during an engagement. Good OPSEC keeps the operator, the tools, and the objective invisible until the mission is complete.
Why OPSEC Matters
- Stealth drives effectiveness: Undetected operators keep access longer and gather cleaner intelligence.
- Attribution protection: Removing links between operator, infrastructure, and action prevents legal or commercial consequences.
- Resource efficiency: Fixing a trace left behind costs more than preventing it.
The OPSEC Cycle
Step | Action | Output |
---|---|---|
1. Identify | List critical information: domains, IPs, aliases, tooling paths, timing. | Protected data inventory |
2. Analyze | Determine who wants that data and why. | Adversary list |
3. Assess Risk | Rate probability and impact if data leaks. | Risk matrix |
4. Apply Countermeasures | Choose technical and procedural controls. | Mitigation plan |
5. Monitor & Review | Check logs, traffic, and behaviour for exposure. | Continuous feedback |
Threat Modeling
- Adversaries: Law-enforcement, CERTs, blue teams, third-party monitors, OSINT hobbyists.
- Capabilities: Packet capture, endpoint telemetry, subpoena power, cloud API logs, blockchain analytics.
- Indicators collected: IP blocks, TLS fingerprints, user-agent strings, unique command sequences, file hashes.
- Risk prioritisation: Focus on data or behaviour easiest to link back to the operator.
Identity & Infrastructure Separation
Layer | Best Practice | Example |
---|---|---|
Personas | One mission → one alias. Never re-use names, emails, or PGP keys. | alpha.ops@proton.me
|
Devices | Burner laptop or dedicated VM per persona. | Low-cost x86 device, no personal accounts |
Networks | Route traffic through chained VPN→Tor→proxy. Never connect from home IP. | 4G router + VPN + Tor |
Data Stores | Encrypt at rest with strong passphrases; separate vaults per mission. | gpg --symmetric AES256 dossier.txt
|
Environment Isolation
- Bare-metal host: Harden BIOS/UEFI, disable Wi-Fi, use full-disk crypto (e.g., LUKS).
- Virtual machines: Snapshot before use, discard after action. Avoid shared clipboards.
- Containers: Apply seccomp, AppArmor, and read-only root.
- Live OS: Tails or Kali in Live mode for zero local residue.
Communication Hygiene
- Encrypt end-to-end (e.g., SimpleX, Signal) and prefer forward-secure protocols.
- Strip metadata from attachments (MAT2, ExifTool).
- Randomise message timing and content length to resist traffic analysis.
- Host C2 over domain-fronted HTTPS or CDN edge nodes.
Network Obfuscation
- IP Masking: Multi-hop VPN chains, Tor bridges, or commercial proxies with mixed exit geos.
- TLS Camouflage: uTLS libraries randomise JA3 and H2 fingerprints.
- DNS Hygiene: Query via DNS-over-HTTPS/TLS or local resolvers on isolated VPS.
- Traffic Shaping: Insert padding packets and mimic popular SaaS patterns.
Anti-Forensics
- Pre-Incident
- Use memory-only implants (fileless).
- Store scripts in tmpfs or ramdisk.
- Redirect shell history to
/dev/null
.
- Post-Incident
- Purge log lines:
journalctl --rotate --vacuum-time=1s
- Timestamp spoofing:
touch -t 201501010000 file
- Secure erase on SSDs with blkdiscard or ATA Secure Erase.
Operational Checklist
Phase | Tasks |
---|---|
Before | Create fresh persona, provision burner VPS, stage payload on dead-drop, test tunnel chain. |
During | Record actions locally (encrypted log), monitor latency for anomalies, rotate tunnels every N minutes. |
After | Remove VPS, revoke keys, shred drives, review logs for leaks, update personal OPSEC playbook. |
Notable Failures
ANOM (2021): Operation Trojan Shield was a sting operation where the FBI and international partners distributed ANOM, a backdoored encrypted messaging app, to criminal networks. This allowed law enforcement to monitor communications, leading to over 800 arrests worldwide.
OPSEC Failure: Criminals adopted a closed-source messaging platform that was distributed through unverified criminal referrals, without performing code audits, infrastructure validation, or origin vetting. Trusting a proprietary system with no transparency enabled full real-time surveillance by law enforcement.
Silk Road (2013): Ross Ulbricht, operating under the alias "Dread Pirate Roberts," created and operated the darknet marketplace Silk Road, which facilitated anonymous drug and weapon sales via Tor and Bitcoin.
OPSEC Failure: In the earliest days of Silk Road, he posted promotional messages using his real Gmail address ("rossulbricht@gmail.com") under the alias "altoid" on public forums like BitcoinTalk. This alias was later linked to the creation of the first Dread Pirate Roberts account, allowing investigators to pivot from metadata to identity.
LulzSec (2011): Members of LulzSec were exposed through leaked IRC chat logs and consistent online behaviors, such as static nicknames, linguistic patterns, and time zone metadata.
OPSEC Failure: Members reused handles across platforms, failed to anonymize IRC sessions via Tor or VPN, and maintained consistent writing styles and time zone habits that enabled cross-correlation and attribution.
Blockchain Deanonymisation: Taint analysis techniques have been used to trace cryptocurrency transactions through mixers, linking them back to KYC-compliant exchange accounts.
OPSEC Failure: Users failed to sufficiently break the link between clean and tainted coins, often reusing wallets or interacting with KYC exchanges after inadequate mixing. This allowed investigators to reconstruct transaction chains using clustering heuristics and trace funds to real identities.
Eldo Kim (2013): Harvard student used Guerrilla Mail and Tor to send bomb threats in an attempt to delay a final exam.
OPSEC Failure: He used Tor from Harvard’s campus network. Investigators correlated the timestamp of the bomb threat email with local network logs showing Tor usage. Since he was the only user of Tor on the Harvard network at that time, attribution was straightforward.
Hector Monsegur ("Sabu") (2011): LulzSec leader operated as a high-profile figure in both LulzSec and AntiSec, coordinating attacks via IRC.
OPSEC Failure: He connected to IRC without anonymization, exposing his real IP address. Investigators monitoring the IRC server captured the IP, traced it to his New York residence, and identified him. One slip in anonymization was enough to dismantle the wider operation.
Florida Student (2025): A 13-year-old student at P.K. Yonge Developmental Research School posted a bomb threat on social media, prompting evacuation and police investigation.
OPSEC Failure: The student used a personally identifiable account and device connected to a known network. Law enforcement traced the threat via IP address, account metadata, and device logs, enabling swift identification and arrest.
Vastaamo Hack (2020): Aleksanteri Kivimäki, known as "Zeekill," hacked a Finnish psychotherapy provider and leaked records of over 30,000 patients, attempting to extort both the company and individual victims.
OPSEC Failure: He accidentally uploaded his full home directory, including identifiable SSH keys and configs. Combined with historical links to other breaches, this led to conclusive attribution and arrest.
Pompompurin / BreachForums (2023): Conor Brian Fitzpatrick, known as "Pompompurin," operated BreachForums, a cybercrime marketplace for stolen data and hacking tools. He was arrested in March 2023 and charged with conspiracy to commit access device fraud.
OPSEC Failure: Fitzpatrick used VPN services, but reused the same VPN IPs across personal accounts—including email, crypto, and Zoom—linking his real identity to his online activity. On June 27, 2022, he accessed BreachForums without Tor or VPN, exposing his home IP address. This, combined with long-term reuse of the "Pompompurin" alias and associated email accounts, led to his identification and arrest.
Tools
Tool | Function |
---|---|
Tails | Live OS that routes all traffic through Tor and leaves no persistent traces |
Whonix | Dual-VM architecture that isolates the workstation from the Tor gateway |
ProtonVPN | No-log VPN with multi-hop and Tor over VPN configurations |
uTLS | Go library to mimic real-world TLS fingerprints and avoid detection |
ExifTool | Strip metadata from images, documents, PDFs, and media files |
MAT2 | Clean metadata from various file types with privacy-focused defaults |
SimpleX Chat | Decentralized communication protocol with no metadata leakage or user identifiers |
Onion Grater | Tor ControlPort policy manager that reduces information leakage |
VeraCrypt | Strong local encryption for containers and full disk volumes; ideal for isolating mission data |
BleachBit | Secure deletion tool to wipe disk and application traces |
GnuPG | Encrypt and sign data using PGP; essential for secure file exchange between identities |
OnionShare | Anonymous file sharing and dropboxes over Tor |
Libra | Framework for private browsing fingerprint resistance (e.g. spoofing canvas, fonts, UA) |
Psiphon | Censorship circumvention tool that blends VPN, SSH, and proxy tunneling |
Firejail | Linux sandboxing tool for isolating applications and reducing footprint |
Nmap | (With caution) Used in stealth scanning; timing and decoy flags important for reducing attribution |
Glossary
- Attribution
- Evidence that links an action to a specific actor.
- Compartmentalisation
- Separating resources so compromise of one does not expose the rest.
- Indicator of Compromise (IOC)
- Observable artefact (hash, IP, string) used for detection.
- Live Operating System
- OS that boots from removable media and wipes RAM at shutdown.
- Taint Analysis
- Blockchain tracing technique tracking coin lineage.
References
- NIST SP 800-150 – Guide to Cyber Threat Information Sharing
- NIST SP 800-86 – Guide to Integrating Forensic Techniques into Incident Response
- MITRE ATT&CK – Defense Evasion
- MITRE ATT&CK – Command and Control
- EFF Surveillance Self-Defense – Guides for protecting your digital privacy
- Bruce Schneier – Security in the Real World: How to Evaluate Security
- CPNI UK – The Level 1 Operational Requirements Process
- NIST Privacy Framework – A Risk-Based Approach to Managing Privacy Risks
- The Tor Project – History and design of onion routing
- Whonix Documentation – Comprehensive guide to anonymous OS architecture
- Tails Documentation – Live operating system with integrated OPSEC principles