- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on February 8, 2017 @ 13:34

Image courtesy of Pixabay user JeongGuHyeok.

Australia and Indonesia have agreed to deepen their cooperation on cyber security issues [1] following the latest meeting of the bilateral Ministerial Council on Law and Security. The joint communique noted [2] the Ministers had agreed to new initiatives including a new Australia–Indonesia Cyber Policy Dialogue later this year, cyber strategy workshops in Australia to share best practice for policy development, and exchanges on lessons learned from the establishment of the Australian Cyber Security Centre to assist the creation of Indonesia’s new cyber security agency. Cyber security has been a sensitive issue between the two countries since the Snowden leaks revealed that Australia had spied on former president Susilo Bambang Yudhoyono [3], and the new initiatives are a welcome sign of cooperation with a key regional player.

Yesterday Justice Minister Michael Keenan released the 2016 statistics for the Australian Cybercrime Online Reporting Network (ACORN) [4], revealing that there wwere about 44,500 reports of cybercrime in Australia last year. The figures show that Victorians were the biggest victims of cybercrime, and that nearly half of reported incidents related to online fraud and scams. The ACORN report was released on international Safer Internet Day [5], an initiative that seeks to raise awareness of cyber security and safety issues, with a particular focus on children.

The Australian Signals Directorate has built on the success of its award winning Top 4 mitigation strategies [6] this week, releasing the ‘Essential Eight’ as part of its new Strategies to Mitigate Cyber Security Incidents. [7] ASD considers the eight mitigation measures to be the cyber security baseline for organisations [8], and additional measures should be adopted based on the risk profile of the organisation. Combined, the eight measures create a defence posture by seeking to prevent malware running on networks, limiting the extent of incidents and aiding the recovery of data. Implementation of the Top 4 is mandatory for Australian government agencies [9], but it’s not clear if it will be expanded to include the four new essential mitigation measures.

Saudi Arabia and Iran’s ongoing cyber spat has sparked up again as up to 15 Saudi government agencies and companies have been hit by a renewed wave of Shamoon 2 malware [10]. Famously used in 2012 against Saudi Aramco [11], the virus wipes the data on affected machines. Shamoon 2 emerged late last year and reportedly affected Saudi Arabia’s Civil Aviation Authority [12]. Cyber security firms Symantec and Palo Alto have released analysis that indicates Shamoon 2’s creators have undertaken significant preparatory work [13] to assist its spread. That includes the use of stolen passwords that Palo Alto reported [14] are likely to have been taken through phishing, based on the passwords’ strength.

The second edition of the Tallinn Manual was released this week [15] by the NATO Cooperative Cyber Defense Centre of Excellence (CCDCOE). The manual addresses the application of international law to cyber operations in peacetime or in conflict short of war, following on from the first manual that addressed the law of armed conflict and its application to cyberspace. ICPC is pleased to be hosting the Australian launch of the Tallinn Manual 2.0 on 24 February. Register here [16] if you would like to come along.

And finally, in the news this week, Samoa has launched a five year cyber security strategy [17], noting the need to protect Samoans and build confidence in the country’s economy. In the UK the Public Accounts Committee has criticised [18] the government’s approach to cyber security. The Committee’s report [19] calls out ‘chaotic’ data breach processes, and lack of action on personnel shortages, and calls for a plan for the new National Cyber Security Centre. In the US, Treasury has already eased some of the sanctions imposed on the Russian Federal Security Servic [20]e (FSB) in response to malicious Russian cyber activities including attempting to influence the 2016 US election. The changes specifically ease the restrictions on the supply of IT products to the FSB. Also in the US, a court has issued an order to Google [21] to retrieve information from a foreign server, reversing the precedent set by an earlier case involving Microsoft in which the court ruled data stored overseas was beyond the reach of a US warrant. In darker places, a vigilante has brought down about one fifth of the ‘Dark Web’ [22]. The unknown actor hacked Tor hosting service Freedom Hosting II [23] because they believed the company was knowingly hoisting large child pornography sited. And here is an interesting account of how Google fought the massive DDoS on KrebsOnSecurity [24] last September.



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-150/

URLs in this post:

[1] have agreed to deepen their cooperation on cyber security issues: http://www.theaustralian.com.au/national-affairs/australia-indonesia-hold-talks-on-us-policies-on-immigration-and-south-china-sea/news-story/ec479538e252595db52a58e391d3034b?nk=525c4eb4f497d6f18d24fb75995c7568-1486443557

[2] The joint communique noted: https://www.attorneygeneral.gov.au/Mediareleases/Pages/2017/FirstQuarter/Communique-2017-Australia-Indonesia-Ministerial-Council-on-Law-and-Security.aspx

[3] Snowden leaks revealed that Australia had spied on former president Susilo Bambang Yudhoyono: http://www.abc.net.au/news/2013-11-18/australia-spied-on-indonesian-president,-leaked-documents-reveal/5098860

[4] Michael Keenan released the 2016 statistics for the Australian Cybercrime Online Reporting Network (ACORN): http://www.gizmodo.com.au/2017/02/people-are-actually-using-the-governments-cybercrime-reporting-portal/

[5] Safer Internet Day: https://www.saferinternetday.org/web/sid/home

[6] Top 4 mitigation strategies: https://www.asd.gov.au/infosec/top-mitigations/top-4-strategies-explained.htm

[7] Strategies to Mitigate Cyber Security Incidents.: http://www.asd.gov.au/infosec/mitigationstrategies.htm

[8] to be the cyber security baseline for organisations: https://www.itnews.com.au/news/drastic-overhaul-of-asds-top-4-cyber-threat-stategies-449787

[9] is mandatory for Australian government agencies: http://www.zdnet.com/article/dsds-top-4-infosec-strategies-now-mandatory-for-aust-govt/

[10] hit by a renewed wave of Shamoon 2 malware: https://www.theregister.co.uk/2017/01/26/shamoon_2_hits_saudi_arabian_targets/

[11] Saudi Aramco: https://en.wikipedia.org/wiki/Shamoon

[12] Saudi Arabia’s Civil Aviation Authority: https://www.theregister.co.uk/2016/12/02/accused_iranian_disk_wiper_returns_to_destroy_saudi_orgs_agencies/

[13] have undertaken significant preparatory work: https://www.symantec.com/connect/blogs/shamoon-back-dead-and-destructive-ever

[14] Palo Alto reported: http://researchcenter.paloaltonetworks.com/2016/11/unit42-shamoon-2-return-disttrack-wiper/

[15] the Tallinn Manual was released this week: https://www.cyberscoop.com/tallinn-manual-2-0/

[16] here: https://www.aspi.org.au/events/australian-launch-tallinn-manual-2.0

[17] Samoa has launched a five year cyber security strategy: http://sobserver.ws/en/02_02_2017/local/16425/Govt-wages-war-on-cyber-crime.htm

[18] Public Accounts Committee has criticised: http://www.cso.com.au/article/613787/uk-public-accounts-committee-slams-government-cybersecurity-strategy/

[19] Committee’s report: https://www.publications.parliament.uk/pa/cm201617/cmselect/cmpubacc/769/76902.htm

[20] Treasury has already eased some of the sanctions imposed on the Russian Federal Security Servic: http://www.theadvertiser.com/story/news/2017/02/02/us-eases-some-economic-sanctions-against-russia/97399136/

[21] a court has issued an order to Google: http://www.thehill.com/policy/cybersecurity/318056-in-change-from-microsoft-case-google-ordered-to-give-feds-data-on?utm_source=&utm_medium=email&utm_campaign=6103

[22] about one fifth of the ‘Dark Web’: https://www.engadget.com/2017/02/05/hack-knocks-out-fifth-of-dark-web/

[23] hacked Tor hosting service Freedom Hosting II: https://motherboard.vice.com/en_us/article/talking-to-the-hacker-who-took-down-a-fifth-of-the-dark-web

[24] interesting account of how Google fought the massive DDoS on KrebsOnSecurity: https://arstechnica.com/security/2017/02/how-google-fought-back-against-a-crippling-iot-powered-botnet-and-won/

Copyright © 2024 The Strategist. All rights reserved.