- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on March 15, 2017 @ 13:07

It’s now been a week since WikiLeaks released a cache of documents exposing the CIA’s cyber espionage tools and techniques. The discussion has this week turned [1] to how the documents got into WikiLeaks’ hands. The tools released in the leak are not as sophisticated [2] as the NSA’s, and it isn’t clear if it’s the entire CIA capability or just a portion of a larger collection. The zero-days contained in the documents [3] are either old, or only affect older versions of operating systems like Android and iOS, and Apple said [4] it has already patched most of the vulnerabilities revealed. More serious concerns have been raised about the “hoarding” of vulnerabilities by the agency, which groups like Electronic Frontier Foundation [5] have said undermine the Vulnerability Equity Process, making people less safe online by hiding known vulnerabilities from vendors.

The UN’s Special Rapporteur on the Right to Privacy, Joe Cannataci, last week called for an international treaty to protect privacy. In his report to the UN Human Rights Council, Cannataci said that ‘it’s time to start reclaiming cyberspace from the menace of over-surveillance.’ [6] China, Iran, Venezuela and Cuba have apparently welcomed the report and discussions of a draft text have begun.

Staying in the US, President Trump last week released the Office of Management and Budget’s annual report [7] to Congress on the cyber security performance of US federal agencies. OMB reported that there were 30,899 cyber incidents in 2016 that compromised information or system functionality. Of these incidents, 16 were classified as ‘major’, affecting national security, public confidence, civil liberties, foreign relations or the economy. Elsewhere The Cipher Brief has an Expert Commentary series [8] on the possibility of splitting Cyber Command and the NSA, including an article by former NSA Director General Michael Hayden [9].

Australia’s cyber leadership has called for a doubling down of efforts on cyber security. In the wake of the Australian Energy Market Operator arguing for greater energy resilience [10] (PDF) as part of the country’s cybersecurity, the Minister Assisting the Prime Minister on Cyber Security Dan Tehan announced [11] that the government was ‘making implementation of the strategy ahead of time a priority.’ Special Adviser to the Prime Minister on Cyber Security Alastair MacGibbon took to the stage in Melbourne at Cisco Live! to remind [12] the country’s innovators that the ‘particularly remarkable’ uptick in hiring and policy development was an opportunity not to be missed by industry.

In South Korea there’s been a spate of DDoS attacks and website defacements associated with Chinese hackers [13] angry at the deployment of the Terminal High Altitude Area Defense (THAAD) missile defence system. Websites for ten South Korean companies were vandalised, as was the website of the Seoul Metropolitan Government. In Taiwan, the latest quadrennial defence review [14] has suggested that Taiwan focus on cyberwarfare skills and capability to enhance its ability to resist Chinese coercion. However the review did not include plans for a new cyber branch [15] for the military, a pledge by the Democratic Progressive Party during the 2016 election.

In cybercrime news, a new report from INTERPOL and Trend Micro [16] has identified that West African cybercrime grew 132% between 2013 and 2015. The paper shows that West African cyber criminals are becoming more sophisticated, fuelling an emerging cybercrime market in the region. And the FBI announced a US$3 million bounty for the capture [17] of Russian cyber criminal Evgeniy Bogachev. Bogachev, who’s also on the US sanctions list, is thought to have at one time controlled over one million computers across the world.

Also in the news this week, an October 2016 breach at a UK National Health Service contractor saw exfiltration of data [18] associated with several thousand NHS employees. A security firm in the US has uncovered a misconfigured US Air Force hard drive [19] which left unsecured documents completely accessible online, including the names, addresses and social security numbers of 4,000 serving members and spouses. The US retailer, Home Depot, will pay [20] US$27.25 million in compensation, and possibly additional damages, to financial institutions over its loss of 56 million credit card numbers in 2014, on top [21] of US$134.5 million already paid to card issuing companies and US$19 million to customers. And researchers at Palo Alto Networks have uncovered [22] ‘RanRan’, a new family of ransomware targeting the computer systems of several Middle Eastern government organisations. So please stay safe out there online—maybe cover your microwave’s camera? [23]



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-155/

URLs in this post:

[1] discussion has this week turned: https://www.scmagazine.com/experts-not-surprised-by-cias-leaked-cyber-weapons-but-stunned-agency-failed-to-protect-them/article/642924/

[2] are not as sophisticated: https://www.businessinsider.com.au/wikileaks-dump-of-cia-hacking-tools-2017-3?r=US&IR=T

[3] zero-days contained in the documents: https://nakedsecurity.sophos.com/2017/03/08/what-wikileaks-massive-cia-leak-tells-us-about-cybersecurity/

[4] Apple said: http://thehackernews.com/2017/03/wikileaks-cia-vault7-leak.html

[5] Electronic Frontier Foundation: https://www.eff.org/deeplinks/2017/03/hey-cia-you-held-security-flaw-information-now-its-out-thats-not-how-it-should

[6] ‘it’s time to start reclaiming cyberspace from the menace of over-surveillance.’: http://www.sbs.com.au/news/article/2017/03/09/un-wants-cyber-surveillance-treaty

[7] released the Office of Management and Budget’s annual report: http://www.govtech.com/security/Cybersecurity-Gaps-Exist-in-Federal-Agencies-White-House-Report-Finds.html

[8] Expert Commentary series: https://www.thecipherbrief.com/article/north-america/disentangling-nsa-and-cyber-command-1092

[9] NSA Director General Michael Hayden: https://www.thecipherbrief.com/article/tech/cutting-cyber-commands-umbilical-cord-nsa-1092

[10] arguing for greater energy resilience: https://www.google.com.au/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0ahUKEwibpfmllNfSAhXDOJQKHUpQCP4QFggZMAA&url=http%3A%2F%2Fwww.aemo.com.au%2F-%2Fmedia%2FFiles%2FElectricity%2FNEM%2FSecurity_and_Reliability%2FReports%2FAEMO-submission-to-finkel.pdf&usg=AFQjCNFlKWcoIKTr1WhTavFnAnYcW5V8pQ&sig2=8VAvd3cHw9Tdai_jIk9Lfg

[11] announced: http://www.theaustralian.com.au/business/mining-energy/dan-tehan-ramps-up-cyber-strategy-to-get-ahead-of-threat-to-power/news-story/943eb8b0fefce4ac2ea3bf1e57a6bdc8

[12] remind: http://www.cso.com.au/article/615605/cisco-live-there-has-never-been-better-time-cybersecurity-australia-macgibbon/

[13] website defacements associated with Chinese hackers: http://www.theinvestor.co.kr/view.php?ud=20170309000911

[14] the latest quadrennial defence review: http://www.straitstimes.com/asia/taiwan-must-rethink-war-strategy-to-counter-chinas-might

[15] did not include plans for a new cyber branch: http://focustaiwan.tw/news/aipl/201703120016.aspx

[16] INTERPOL and Trend Micro: https://www.interpol.int/News-and-media/News/2017/N2017-026

[17] FBI announced a US$3 million bounty for the capture: https://www.nytimes.com/2017/03/12/world/europe/russia-hacker-evgeniy-bogachev.html?_r=0

[18] saw exfiltration of data: https://arstechnica.co.uk/tech-policy/2017/03/hackers-steal-nhs-staff-data-landauer-server-breached/

[19] uncovered a misconfigured US Air Force hard drive: http://thehill.com/policy/cybersecurity/323644-sensitive-info-from-air-force-backup-drive-was-publicly-visible-online?utm_source=&utm_medium=email&utm_campaign=6659

[20] pay: https://www.infosecurity-magazine.com/news/home-depot-to-pay-2725m/

[21] top: http://fortune.com/2017/03/09/home-depot-data-breach-banks/

[22] uncovered: http://researchcenter.paloaltonetworks.com/2017/03/unit42-targeted-ransomware-attacks-middle-eastern-government-organizations-political-purposes/

[23] maybe cover your microwave’s camera?: https://www.wired.com/2017/03/kellyanne-conway-microwave-spying/

Copyright © 2020 The Strategist. All rights reserved.