- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on March 1, 2017 @ 12:26

The Australian government has kept the cyber ball rolling this week, with the launch [1] of the Joint Cyber Security Centre in Brisbane, the first of five slated capital city hubs worth $47 million [2] in across the country. The joint cyber centres are designed as collaborative work spaces and an information sharing portal across government, business and law enforcement on cybersecurity issues. Cybersecurity centres haven’t been limited to Australia, with Microsoft opening [3] up a Cyber Security Engagement Centre in Mexico, aiming to dismantle botnets and cybercrime organisations in Latin America.

New York State’s Stewart International Airport was confronted with an embarrassing discovery [4] this week; a server backup drive had been left exposed to the internet since April 2016, potentially leaking 760GB of unsecured data, including [5] internal e-mails, memos, “sensitive” TSA letters of investigation, and schematics of the airport and surrounding infrastructure. One file contained an unsecured list of usernames and passwords for the various systems at the airport, which reportedly could’ve been used to generate boarding passes to any destination for any traveller at the airport, even those on the no-fly list. The drive has since been secured [6], with no preliminary indications that data was copied from the drive.

Israeli Prime Minister Benjamin Netanyahu visited Australia last week, and issued a joint statement [7] with Prime Minister Turnbull about the two countries’ commitment to bilateral cooperation in cybersecurity. In Israel, the Ministry of Justice’s Israel Law, Information and Technology Authority has formulated draft regulations [8] to be discussed in the Knesset regarding data security, including a regulation to compel database owners to notify subjects regarding data breach events, similar to mandatory data breach notification regulations in the EU [9] and, very recently, Australia [10].

Still in Israel, researchers from the Cyber Research Center at Ben-Gurion University demonstrated [11] (in a report [12] delightfully titled ‘LED-it-GO’) how to exfiltrate data from air-gapped computers by flashing hard-drive indicator lights up to 5,800 times a second to a nearby drone-mounted [13] camera. Vulnerability researchers from Google and the Netherlands-based Centrum Wiskunde & Informatica announced [14] that, after two years of research, they’d successfully mounted a ‘collision attack’ against the Secure Hash Algorithm-1 function, rendering it insecure. For a good breakdown of the specifics, as well as links to the supporting research, read this [15].

Google has again used Twitter to sound [16] the alarm about a vulnerability on the Cloudflare Content-Delivery-Network. Cloudflare, an information security service provider that keeps clients safe from DDoS attacks, has since announced [17] that their servers were leaking sensitive information. In a promising display of resilience and responsiveness, the source of the bug was shut down within 44 minutes and fixed completely within 7 hours, but concerns remain over data leaked from websites that used Cloudflare in the period from September 2016 till now.

As much as “fake news” has been trending in traditional media, the cyber-world has seen a crackdown on “fake accounts”, with the Philippines’ Senate set to debate [18] a bill which would require social media networks to verify the identity of users who register for accounts, and mandating shut-down procedures for compromised accounts. US Customs and Border Protection officials are also beginning [19] to ask incoming visitors for their social media accounts. Officials have maintained that the question is optional, and refusing to answer shouldn’t be cause for penalty, but critics are concerned about the increasing use of social media intelligence in routine border controls. Google has boosted the accessibility of its tools to manage fake accounts , opening up the Jigsaw [20] Application Programming Interface (API), giving developers throughout the open source community access to anti-harassment machine learning tools (like their ‘toxicity meter’) to automatically detect insults, harassment and abuse hurled online. The developers hope [21] that the tool will be used carefully to create “safe spaces” and restore open discussion on the internet, but critics have voiced their concerns [22] about the implications for automated censorship and over-moderation.

And finally, ASPI was fortunate enough to host the Australian launch event [23], one of a series of launches around the world, for the Tallinn Manual 2.0 [24] on International Law Applicable to Cyber Operations last Friday, hearing directly from the experts behind the manual. One of the experts was Professor Michael Schmitt, Senior Fellow at the NATO Cooperative Cyber Defence Center of Excellence, who also spoke to the ABC’s current affairs program PM about the manual. Check out the interview here [25].



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-153/

URLs in this post:

[1] launch: https://www.attorneygeneral.gov.au/Mediareleases/Pages/2017/FirstQuarter/Turnbull-government-launches-first-joint-cyber-security-centre.aspx

[2] $47 million: http://www.zdnet.com/article/government-launches-first-of-au47m-joint-cyber-security-centres-in-brisbane/

[3] opening: http://www.digitaltrends.com/computing/microsoft-cybersecurity-mexico/

[4] discovery: https://www.engadget.com/2017/02/24/security-error-leaves-ny-airport-servers-unprotected-for-a-year/

[5] including: https://mackeeper.com/blog/post/334-extensive-breach-at-intl-airport

[6] secured: http://www.zdnet.com/article/unsecured-servers-at-new-york-airport-left-exposed-for-a-year/

[7] joint statement: https://www.pm.gov.au/media/2017-02-23/joint-statement

[8] regulations: http://www.jpost.com/Opinion/A-first-legislative-step-in-the-fight-against-cyber-threats-New-data-security-regulations-482319

[9] EU: https://blog.varonis.com/eu-gdpr-spotlight-72-hour-breach-notification-rule/

[10] Australia: https://www.oaic.gov.au/media-and-speeches/statements/mandatory-data-breach-notification

[11] demonstrated: https://www.theregister.co.uk/2017/02/23/hard_drive_light_used_to_exfiltrate_data/

[12] report: https://arxiv.org/abs/1702.06715

[13] drone-mounted: https://www.youtube.com/watch?v=4vIu8ld68fc&feature=youtu.be

[14] announced: https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html

[15] this: https://securityintelligence.com/news/collision-attack-sounds-the-death-knell-for-sha-1-cryptographic-function/

[16] sound: https://twitter.com/taviso/status/832744397800214528?ref_src=twsrc%5Etfw

[17] announced: https://blog.cloudflare.com/incident-report-on-memory-leak-caused-by-cloudflare-parser-bug/?utm_content=buffere476a&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

[18] debate: http://www.gmanetwork.com/news/story/600786/news/nation/bam-hopes-house-bill-regulating-social-media-will-combat-cyber-threats

[19] beginning: http://www.politico.com/blogs/under-the-radar/2017/02/trump-chinese-visitors-social-media-check-235146

[20] Jigsaw: https://jigsaw.google.com/vision/

[21] hope: https://medium.com/jigsaw/when-computers-learn-to-swear-a53ee2cd09a2#.v7bxq6c18

[22] concerns: https://www.wired.com/2017/02/googles-troll-fighting-ai-now-belongs-world/

[23] event: https://www.aspi.org.au/events/australian-launch-tallinn-manual-2.0

[24] Tallinn Manual 2.0: http://www.cambridge.org/au/academic/subjects/law/humanitarian-law/tallinn-manual-20-international-law-applicable-cyber-operations-2nd-edition?format=PB

[25] here: http://www.abc.net.au/pm/content/2016/s4625899.htm

Copyright © 2020 The Strategist. All rights reserved.