- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on June 8, 2016 @ 12:03

The ghosts of social media accounts past [1] have come back to haunt millions of people this week, with the release of user credentials for 360 million MySpace users [2] being released for sale online. Selling stolen credentials can be a lucrative business [3], and reseller LeakedSource.com has reportedly [4] added 1 billion records to its database in the past month. One high profile victim was Facebook founder and CEO Mark Zuckerberg [5], who has been caught red handed breaking the cardinal rule of password security and reusing the same password for multiple sites (yeah I know…we all do it). Zuckerberg’s Twitter and Pinterest accounts were hacked using the password ‘dadada’, which also appeared [6] as one of 100 million LinkedIn credentials leaked last month. If you want to check if any of your old accounts have been compromised, click here [7].

The annual Shangri-La Dialogue devoted a dedicated special session to cyber issues for the first time [8] over the weekend. William Saito, special adviser on cybersecurity to the Japanese Cabinet noted that Japan was focussed on defending infrastructure critical to the 2020 Tokyo Olympic games [9] from cyber threats, while the head of Singapore’s Cyber Security Agency David Koh highlighted the ability of malicious cyber actors to take advantage of the seams in regulation between countries to avoid punishment. One of the largest barriers to greater cooperation on cybersecurity is the different objectives of major international states for the future of the internet [10], which former US National Intelligence Officer for Cybersecurity Sean Kanuck noted means that ‘it probably isn’t a surprise that the accomplishments to date have been modest’.

US Defense Secretary Ash Carter also noted the growing anxiety in the Asia–Pacific about China’s actions in cyberspace [11] at Shangri-La. These comments echoed Carter’s speech to the US Naval Academy on 27 May [12], which moved beyond the usual calling out of Chinese cyber espionage and linked China’s behaviour in cyberspace to its actions in the South China Sea. His criticism at the Academy also had a heavy trade focus, saying that Chinese regulation of digital trade undercuts the principles of the global system from which China has benefitted [13]. It’s likely Carter’s message was also intended to hit home before the Sino-US Strategic and Economic Dialogu [14]e in Beijing this week, where cyber issues were also high on the agenda. The Wall Street Journal has a good summary of new Chinese cyber regulations here [15] and there’s a more in-depth discussion of Chinese cyber laws from The Diplomat here [16].

The NATO conference in Warsaw next month [17] will focus on the alliance’s cyber capabilities and threats. German Major General Ludwig Leinhos, head of the Bundeswehr’s fledgling Cyber Command, told reporters that he expects that NATO will officially designate cyberspace as an operational domain of warfare [18]. NATO’s refocus on Russia has brought with it attention on Russia’s asymmetric capabilities including cyber capabilities. However, despite warnings of a new arms race by figures such as Mikko Hypponen [19], a US Defense spokesperson told Russian news outlet Sputnik this week [20] that due to Russian actions in Ukraine, the US has no plans to discuss cyberspace with the Russian military.

There have been renewed calls in India to stand up a Cyber Command, first promised in 2013 [21] after a cyber espionage campaign targeting Indian government officials was reported by FireEye [22]. The group, suspected [23] to be a Pakistani APT previously observed by FireEye, used spear phishing tactics to dupe officials into opening a Microsoft Word document that dropped a malicious payload called BreachRAT [24], opening a backdoor to the users information. ASPI has previously commented on the slowness of India’s implementation of its 2013 National Cyber Policy in the 2015 Cyber Maturity in the Asia–Pacific report [25].

On a final note, make sure to check out ASPI’s latest publication, Agenda for Change 2016 [26]: Strategic choices for the next government released yesterday. The International Cyber Policy Centre has summed up the key cyber issues facing the next government and made five key recommendations them to quickly address critical  cyber policy challenges, and to take a leading role—regionally and globally—in overcoming cyber threats:

  1. Effectively implement the recently announced Australian Cyber Security Strategy.
  2. Deliver an international cyber strategy. Appoint an ambassador who will be able to hit the ground running and quickly engage internationally. Increase the budget for capacity building in line with regional aspirations outlined in the international strategy.
  3. Devise a strategy to fill IT skills shortages in the immediate short-term (<2years).
  4. Ensure that the government’s threat information sharing centres are accessible, productive and effective. Removing red tape around security classifications and access to information will be crucial, as will providing threat information that’s timely, relevant and actionable.
  5. Release a publicly accessible Defence Department policy on how cyber operations, both offensive and defensive, are governed and integrated into broader Defence activities. This will support the coherent development of those capabilities, assist efforts to shape international cyber policy in line with the whole-of-government strategy and maintain a rules-based global order as outlined in the 2016 DWP.

Late news just in, New Zealand has announced that it has an offensive cyber capability in its new Defence White Paper [27], released today. Defence Minister Gerry Brownlee told media that New Zealand has developed the capability to deter cyber interference in critical defence networks [28]. In case you missed it, Jim Lewis has explained the rationale for such capabilities for ASPI here [29], and on The Strategist earlier today [30].  



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-123/

URLs in this post:

[1] ghosts of social media accounts past: http://www.attn.com/stories/8764/myspace-account-passwords-leaked

[2] 360 million MySpace users: https://www.leakedsource.com/blog/myspace

[3] can be a lucrative business: https://securityintelligence.com/fraudsters-selling-login-credentials-for-facebook-twitter-in-bulk/

[4] reportedly: http://www.theaustralian.com.au/business/technology/mark-zuckerberg-twitter-pinterest-accounts-hacked/news-story/fc29ae14df4f6558b0e1277ccf5e8daa

[5] Facebook founder and CEO Mark Zuckerberg: http://www.scmagazineuk.com/zuckerberg-cyber-zecurity-zucks/article/501008/

[6] appeared: http://bgr.com/2016/05/20/linkedin-hacked-2016-accounts-list-passwords/

[7] click here: https://haveibeenpwned.com/

[8] devoted a dedicated special session to cyber issues for the first time: https://www.iiss.org/en/events/shangri%20la%20dialogue/archive/shangri-la-dialogue-2016-4a4b/special-sessions-ff25/session-6-cf2b

[9] noted that Japan was focussed on defending infrastructure critical to the 2020 Tokyo Olympic games: http://www.reuters.com/article/us-asia-security-cyber-idUSKCN0YR0DA

[10] different objectives of major international states for the future of the internet: http://www.nationalcybersecurityinstitute.org/international/china-and-u-s-visions-of-the-internet-compete/

[11] the growing anxiety in the Asia–Pacific about China’s actions in cyberspace: https://www.iiss.org/en/events/shangri%20la%20dialogue/archive/shangri-la-dialogue-2016-4a4b/plenary1-ab09/carter-1610

[12] US Naval Academy on 27 May: http://www.defense.gov/News/Speeches/Speech-View/Article/783891/remarks-at-us-naval-academy-commencement

[13] principles of the global system from which China has benefitted: http://www.lowyinterpreter.org/post/2016/06/03/Before-Shangri-La-Carter-shifts-focus-to-Chinas-cyber-strategy.aspx

[14] Strategic and Economic Dialogu: http://www.state.gov/secretary/remarks/2016/06/258091.htm

[15] here: http://blogs.wsj.com/chinarealtime/2016/06/03/untangling-chinas-cybersecurity-laws/

[16] here: http://thediplomat.com/2016/06/chinas-internet-policy-offers-the-wrong-kind-of-lessons/

[17] NATO conference in Warsaw next month: http://www.defensenews.com/story/defense/2016/06/02/nato-cyber-warsaw-summit/85289290/

[18] NATO will officially designate cyberspace as an operational domain of warfare: https://www.yahoo.com/tech/nato-likely-designate-cyber-operational-domain-war-german-103546709--finance.html

[19] despite warnings of a new arms race by figures such as Mikko Hypponen: http://www.theregister.co.uk/2016/06/06/f_secure_cyberwar_iii/

[20] told Russian news outlet Sputnik this week: http://sputniknews.com/world/20160601/1040575119/usa-russia-cybersecurity.html

[21] first promised in 2013: http://www.idsa.in/idsacomments/NationalCyberSecurityPolicy2013_stomar_260813

[22] FireEye: https://www.fireeye.com/blog/threat-research/2016/06/apt_group_sends_spea.html

[23] suspected: http://www.securityweek.com/pakistan-apt-group-targets-indian-government

[24] dropped a malicious payload called BreachRAT: http://news.softpedia.com/news/pakistani-resume-cyber-espionage-operations-against-india-504874.shtml

[25] Cyber Maturity in the Asia–Pacific report: https://www.aspi.org.au/publications/cyber-maturity-in-the-asia-pacific-region-2015

[26] Agenda for Change 2016: https://www.aspi.org.au/publications/agenda-for-change-2016-strategic-choices-for-the-next-government

[27] Defence White Paper: http://www.defence.govt.nz/reports-publications/dwp-2016/defence-white-paper-2016.html

[28] New Zealand has developed the capability to deter cyber interference in critical defence networks: http://www.stuff.co.nz/national/politics/80835677/defence-white-paper-20b-defence-upgrades-for-new-planes-boats-and-cyber-security.html

[29] here: https://www.aspi.org.au/publications/cyberspace-and-armed-forces-the-rationale-for-offensive-cyber-capabilities

[30] The Strategist earlier today: http://www.aspistrategist.org.au/rationale-offensive-cyber-capabilities/

Copyright © 2016 The Strategist. All rights reserved.