LOLCats and PC viruses - Japan gets a lesson in cybersecurity

The national police reboot their anti-hacker tactics after months of public ridicule from what appears to be a rogue hacker

National TV anchors struggle through explanations of the Tor anonymity network, while newspapers run detailed graphics on remote hacking software and the national police warn against using obscure online tools known as Syberian Post Offices.

Japan is in the midst of a cybercrime fix.

The public has been drawn in by the saga of what appears to be a lone hacker who slipped software onto the computers of innocents and used them to post fictional warnings of imminent mass murders at public schools and attacks against airplanes. He then spent months taunting authorities through emails to the national press.

After a public pursuit that included multiple false arrests, a taunting message that led to a memory card planted on the pink collar of a cat on a small island, and images posted online with their location data apparently tweaked to mislead authorities, police finally arrested suspect Yusuke Katayama, a 30-year-old slightly chubby IT worker, last week. Police seem confident they got the man responsible for it all, though some are still doubtful.

"It took so long, and it seemed as though the police were helpless to find him," said Yoji Ochiai, a lawyer and former public prosecutor who specializes in online crimes, and who also received emails from the hacker.

"This can be thought of as a major lesson for the police."

The more colorful bits of the story have trickled out through the Western media in short bytes of hacker comedy -- bungling police arrest and question the wrong guy, four times; online videos of the cat rubbing up against the legs of reporters -- but industry watchers say the ordeal has triggered real change. The public humiliation has forced Japan's National Police Agency (NPA), whose role is similar to organizations like the Federal Bureau of Investigation in the U.S., into swiftly adopting a number of reforms.

"The police made the false arrests based on the IP addresses of computers that accessed the public forums, that was the standard," said Yoshimi Usui, the director of RIIS, the Research Institute of Information Security.

"It seems they didn't even know that anonymizer tools existed."

Previous incidents have been far more serious -- the Sony gaming network hack in 2011, stolen secrets from military contractors and the space agency, online break-ins at parliament -- but nothing has captured the country's attention quite like this.

The events that led up to the arrest started in June of last year, when messages of mass killings and public attacks began appearing in online postings. After authorities arrested and released the wrong suspects, the hacker, who police now say is Katayama, chided them through emails to the press, including one that led them to the memory card on the cat. The card contained a copy of a powerful program authorities believe Katayama created and employed, which allowed him to anonymously control remote computers and make the postings.

The national press have covered each new development in detail. Police have felt pressure and responded with uncharacteristic speed.

In December the NPA offered ¥3 million (US$32,000) for information about the individual behind the high jinks, its first-ever reward for a hacker. The agency's wanted posters, ever-present in Japanese train stations and post offices, usually feature a blurry image of a hooded figure, snipped from security camera footage, with a list of crimes and birthmarks. But the hacker poster was something new - its only picture is a pair of cartoon hands on a laptop, followed by a long block of text detailing technical skills including C# programming and the use of a "Syberian Post Office," a tool for making online postings anonymously.

Earlier this month, before the latest arrest, the NPA released an "emergency program" for battling cybercriminals, specifically mentioning its failures in the hacking case as motivation. New measures include police officials "joining hacking communities" and forming relationships with hackers to glean information, as well as figuring out how to peg criminals who use tools like Tor.

It is still unclear if police have their man in Katayama, though officials have said they possess irrefutable proof. He has steadfastly denied being the mastermind behind the cyberattacks, citing his lack of ability as proof.

"If you compare the skills of the 'actual criminal' and Katayama, it's obvious he is far more talented than Katayama. It is clear if you look at Katayama's abilities that he is not the criminal here," the suspect's lawyer told reporters.

The program used to take control of remote computers and post threats online, "iesys.exe," was custom-built in the C# programming language, and has been painstakingly analyzed by authorities. The Tokyo Metropolitan Police Department has taken the rare step of posting detailed descriptions of the software, including the classes and variables used in its source code.

"Detailed information about this virus has been made public with the intention of encouraging the public to provide further information about it," reads a special section of the department's Web page devoted to the virus.

Once it had infected a computer, the software hid in the background and periodically checked free online bulletin boards on a Japanese portal, "livedoor," for commands from its controller. These included instructions to turn keylogging on and off, upload and download files, and post messages to other bulletin boards.

Authorities have discovered multiple versions of the Windows program in the wild, according to reports, and those who have analyzed them say they are complex and unique. Security firm Trend Micro has rated the code's "damage potential" as high, and says users must manually modify their computers' registries to get rid of it.

The complexity of the program, and the meticulous way it was developed, appear to contrast with Katayama's actions in the months when he was allegedly toying with Japan's national police. Authorities have said he occasionally failed to anonymize his Internet activities, and traced him to the online purchase of a small figurine that later appeared in a photo he sent to newspapers.

The FBI cooperated with Japanese police and provided the contents of a Dropbox account used by the suspect, the contents of which included a copy of the "iesys.exe" virus, according to the Nikkei business newspaper.

If Katayama does turn out to be the mastermind behind the program and the one that made threats online, it appears police caught a break in their first public duel with a hacker of his stature. One of their main leads was decidedly low tech -- video footage of him caught by a security camera on Enoshima, the small island where he allegedly planted the memory card on a local cat.

"It appears that he wanted to show off and went too far. If this is true then the police were fortunate he did so, because they probably wouldn't have found him otherwise," said Ochiai.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags government

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jay Alabaster

IDG News Service
Show Comments

Cool Tech

Toys for Boys

Family Friendly

Stocking Stuffer

SmartLens - Clip on Phone Camera Lens Set of 3

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?