Cyber wrap
25 May 2016|

Following costly compromises in Bangladesh, Vietnam and Ecuador, Gottfried Leibbrandt, CEO of international bank settlement company Swift has told a conference in Brussels that cyber threats are his main source of anxiety. In his speech Leibbrandt outlined the organisation’s response to the cyber security breaches that have seen millions of dollars stolen. According to Leibbrandt, Swift plans to harden its security requirements, require certification for third party providers, assist members to identify suspicious behaviour, and develop security audit frameworks to ensure new security controls are properly implemented.

Swift has also criticised some members for being slow to report cyber security incidents affecting the network. Internationally, data breach notification requirements are inconsistent and there is disagreement about whether mandatory breach reporting has value. In The Wall Street Journal, Denise Zheng from CSIS and Andrea Castillo from George Mason University have discussed the case for and against mandatory data breach notifications. Zheng says that requiring companies to disclose breaches improves collective cyber security responses, but Castillo believes that regulating breach disclosure could weaken the ability of companies to properly investigate and respond to cyber threats. In Australia, the Privacy Amendment (Notifications of Serious Data Breaches) Bill is expected to be introduced into Parliament later this year. The Bill includes mandatory data breach disclosures and notifications for customers whose data is lost in cyber security incidents.

James Clapper, the US Director of National Intelligence, told Congress back in 2015 that Russia had surpassed China as the US’s principal cyber threat, even though Russian hackers have been notoriously hard to detect. This week Switzerland’s CERT.ch has revealed that one of the country’s top defence, aerospace and technology firms, Ruag, had been compromised for at least two years by an APT, most likely linked to the Russian Turla APT. CERT.ch was apparently monitoring the breach for some time to gather evidence about the APT’s tactics and techniques, but this was cut short after a media leak earlier this month. CERT.ch characterised the actor responsible as extremely patient and deliberate, moving carefully through the company’s network and identifying individuals so that they could specifically target only those with valuable information. System logs revealed at least five occasions last year when significant amounts of Ruag’s data was exfiltrated using proxy servers.

Not to be outdone, a Chinese APT dubbed ‘Ke3chang’ by FireEye has reappeared two and a half years after it was first detected targeting European foreign ministries just before the G20 summit. Palo Alto’s Unit42 has found evidence that Ke3chang has reengineered a remote access tool into a new tool called TidePool in order to target 30 Indian embassies around the world. Ke3chang distributes TidePool by spoofing emails from other embassy employees to induce their targets to open infected attachments. The vulnerability used (CVE-2015-2545) has also recently been used by another hacker group against anti-China protesters in Hong Kong.

Moving across the ditch, Andrew Hampton, the new head of New Zealand’s signals intelligence organisation GCSB, has told stuff.co.nz that one of the ‘more disturbing revelations’ of his first month at the helm was the scale of the cyber threat that his agency deals with. Hampton revealed that GCSB detects an average of seven serious cyber incidents per month, in addition to about 12 reports from other agencies of less serious incidents. He characterised the actors responsible as ‘foreign sourced, complex and persistent’. Hampton is a career public servant, but unusually for his role has no previous experience in intelligence or security.

And finally, the status of the US Cyber Command is again under examination, as Congress debates a measure in the National Defense Authorisation Act (NDAA) that would elevate Cyber Command to the status of Unified Combatant Command, equivalent to Pacific Command or Central Command. The measure was passed by the House, but is absent from the Senate’s version of the Bill, and the White House has opposed its inclusion in the NDAA. Cyber Command is currently a Sub-unified Command of Strategic Command, while its commander Admiral Mike Rogers is dual-hatted as Director of the NSA. Rogers has lobbied for Cyber Command to be taken out of Strategic Command as it would allow more control over its strategic priorities and budget measures which he believes  will allow it to better respond to cyber threats.