{"id":17448,"date":"2020-10-06T14:50:11","date_gmt":"2020-10-06T10:50:11","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/pied-piper-hamelin\/17448\/"},"modified":"2020-10-06T14:50:11","modified_gmt":"2020-10-06T10:50:11","slug":"pied-piper-hamelin","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/pied-piper-hamelin\/17448\/","title":{"rendered":"The Pied Piper of Hamelin and cyberweapons"},"content":{"rendered":"<p>Contrary to popular opinion, fairy tales and folk legends were not invented as entertainment, but to teach children (and adults) important lessons in an easy-to-understand form. Since time immemorial, storytellers have woven cybersecurity tips into their tales, hoping to make the Internet (which they foresaw) a safer place. For example, the <a href=\"https:\/\/www.kaspersky.com\/blog\/fairy-tales-red-hood\/28707\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">story of Little Red Riding Hood<\/a> is a warning about MitM-type attacks, and <a href=\"https:\/\/www.kaspersky.com\/blog\/snow-white-cryptominers\/31987\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Snow White<\/a> foreshadows government-sponsored APT campaigns. The list <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/fairy-tales\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">goes on<\/a>.<\/p>\n<p>Unfortunately, humankind continues to repeat the same mistakes with manic persistence, ignoring the obvious lessons of fairy tales. Another striking example of this is the legend of the Pied Piper of Hamelin.<\/p>\n<h2>The Pied Piper of Hamelin<\/h2>\n<p>As is often the case with truly old tales, several versions have been handed down to us, all of them variations on the same basic theme. The essential plot goes something like this: The German town of Hamelin is infested with rats, which eat food supplies, attack people and domestic animals, and generally cause an almighty nuisance.<\/p>\n<p>Unable to cope, the local authorities hire the services of a specialist in the form of a fancily dressed rat-catcher, who uses a magic pipe to lure the rats out of the town and into the nearby river, where they drown.<\/p>\n<p>Afterward, the miserly mayor refuses to fulfill his side of the deal, and offers the rat-catcher, aka the Pied Piper, a far lower remuneration than was stipulated in the contract. The Piper says nothing. Instead, he takes his revenge by using his magic pipe again, this time to lure the children of Hamelin away in the same manner he did with the rats.<\/p>\n<p>The ending depends on when the narrator lived and how optimistic they were (usually not very). The children are either drowned in the Weser River like the rats, are taken deep into the Koppenberg hills, or (in the most recent and least gloomy rendering) go beyond the hills to a distant land where they found a city.<\/p>\n<h2>The meaning behind the allegory<\/h2>\n<p>Curiously, the incident is given a precise date: June 26, 1284. The legend was first recorded in the town chronicles in 1375, after which it was rewritten and retold several times, acquiring extra details and embellishments in the process. Most of the details have clear politic or religious motivations. Some versions focus on the greed of the citizens of Hamelin; others openly demonize the figure of the Piper. We shall skip the medieval prejudices of the day and focus on the basic facts.<\/p>\n<h3>Attacks on Hamelin<\/h3>\n<p>The way we see it, Hamelin\u2019s infrastructure comes under attack from unknown malicious actors. They literally devour material assets (grain) and information (legal documents), and threaten the health of local residents.<\/p>\n<p>No detailed description of the attack has survived, but it\u2019s likely that the attackers were referred to as \u201crats\u201d because they used a Remote Access Tool (or Remote Access Trojan), both abbreviated as RAT. In general, such tools\/Trojans can be used for all kinds of dirty work, because they give attackers full access to a victim\u2019s system.<\/p>\n<h3>Hired specialist<\/h3>\n<p>At first, the town residents try a cat-based solution to protect their endpoints, but when that method proves ineffective, they engage a third-party expert who knows about a vulnerability in the attackers\u2019 RAT. Targeting the vulnerability, he assembles a powerful cyberweapon to take remote control of the RAT operators\u2019 computers, turning them into a kind of botnet. Having penetrated them all, the Piper successfully neutralizes the threat.<\/p>\n<h3>Targeting civilians<\/h3>\n<p>After the RAT attack is defeated, the authorities unwisely fail to honor their contract with the specialist. Most versions of the legend mention financial disagreements, but that is impossible to verify, of course. Whatever the case, it turns out the same vulnerability is present in the devices the town\u2019s children use.<\/p>\n<p>Regrettably, the tale does not provide technical details to explain why the same threat works against both RAT operators and ordinary members of the public. Let\u2019s assume it was a vulnerability in something ubiquitous (for example, some popular <a href=\"https:\/\/en.wikipedia.org\/wiki\/Server_Message_Block\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">application-level network protocol<\/a> used for remote access to network resources).<\/p>\n<p>Nor is it entirely clear why the so-called adults in the tale are not affected by the vulnerability. Perhaps the word \u201cchildren\u201d in the story refers not to underage users, but to a new generation of devices with a more recent operating system that developed a vulnerability after a botched update of the aforementioned protocol.<\/p>\n<p>Either way, the finale is tragic: The Piper performs the same botnet trick\u00a0\u2014 only not on RAT operators this time, but on the town\u2019s youngsters.<\/p>\n<h2>The Pied Piper of Hamelin in modern times<\/h2>\n<p>The preceding is highly reminiscent of the story of the Shadow Brokers hacker group and the EternalBlue exploit leak, which led to the <a href=\"https:\/\/www.kaspersky.com\/blog\/five-most-notorious-cyberattacks\/24506\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">WannaCry outbreak<\/a> as well as several other ransomware epidemics. If I had read the tale of the Pied Piper of Hamelin only after the EternalBlue leak, no doubt I would have taken it as a report, albeit an allegorical one, on that incident. The storyline is indeed identical: A government organization commissions the development of a powerful cyberweapon that is then unexpectedly used against the inhabitants of that same country.<\/p>\n<p>We can attribute this remarkable coincidence to history\u2019s habit of developing in a spiral. Obviously, sixteenth-century German infosec experts were already aware of the problem and tried to warn their descendants (us) of the dangers of government-sponsored cyberweapons programs, which one day might be turned against civilian users\u00a0\u2014 with nasty consequences.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here\u2019s our take.<\/p>\n","protected":false},"author":700,"featured_media":17449,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[205,844,2173,714,2047],"class_list":{"0":"post-17448","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-botnets","10":"tag-cyberweapons","11":"tag-fairy-tales","12":"tag-rat","13":"tag-truth"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/pied-piper-hamelin\/17448\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/pied-piper-hamelin\/21970\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/pied-piper-hamelin\/23414\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/pied-piper-hamelin\/21602\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/pied-piper-hamelin\/20244\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/pied-piper-hamelin\/24032\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/pied-piper-hamelin\/23023\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/pied-piper-hamelin\/29208\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/pied-piper-hamelin\/8896\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/pied-piper-hamelin\/37240\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/pied-piper-hamelin\/15775\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/pied-piper-hamelin\/16229\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/pied-piper-hamelin\/25368\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/pied-piper-hamelin\/12081\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/pied-piper-hamelin\/29337\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/pied-piper-hamelin\/22966\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/pied-piper-hamelin\/28255\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/pied-piper-hamelin\/28090\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/fairy-tales\/","name":"fairy tales"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=17448"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17448\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/17449"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=17448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=17448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=17448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}