- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on May 28, 2014 @ 12:15

[1]The fallout and back-and-forth between China and America has continued after last week’s announcement by U.S. Attorney General Eric Holder of indictments against five Chinese military officers for ‘serious cybersecurity breaches’. (If you missed the news, the ABC had a solid run-down on developments [2], including an interview with ICPC’s Toby Feakin.) The charges represent a major change of strategy and policy [3] for the Obama administration as it seeks to hold China accountable for what it sees as a cyber espionage campaign targeting American intellectual property. China hit back at claims [4] that its government and military had been involved in the cyber theft of trade secrets, insisting rather that it had been a victim of US spying, name-dropping privacy-warhorse Edward Snowden to make their point.

The evidence levelled against the Chinese shows just how quickly the sands can shift on cyber matters: ICPC’s Simon Hansen concluded [5] that ‘straight-faced deniability is no longer the smoke screen it once was’, while Thomas Rid noted [6] that the indictment sets ‘a new bar for future attribution reports’. Peter Singer of Brookings has also turned in a comprehensive interview [7] to Vox on the implications of the US move on cyber espionage.

US law-enforcement officials last week announced [8] the arrest of 97 people in 19 countries —said to be the largest global cyber law enforcement operation ever undertaken—for using and distributing malware named the BlackShades Remote Access Tool. The malware ‘allows cybercriminals to take control of your computer:’ they can spy on you through your web camera, steal your files and account information and see what you are typing’. Gail Sullivan over at the Washington Post has some commentary on BlackShades [9], as does Brian Krebs on his blog Krebs on Security [10]. In related news, a hacker formerly of the LulzSec group [11] has had his 26-year prison term quashed [12] after he cooperated with authorities in order to prevent in excess of 300 cyber attacks, including those against utilities companies and the US Senate website.

The Jakarta Post has this week reported [13] on the development of Indonesia’s cyber defence force. The Cyber Operations Center, located at the MoD headquarters in Pondok Labu, South Jakarta, has teams across a range of tasks including intrusion prevention, threat analysis, hacker monitoring, recovery and attack. Beyond those staff in the Cyber Operations Center, there will be individual units across the TNI in the Army, Navy, Air Force and the ministry. Indonesian officials have recognised the program as operationally ready although ‘embryonic’ with ‘four to five skilled operators in each division’, which they hope to grow to 20 per group. No doubt the MoD was taking names when they hosted 30 teams from across Indonesia recently at the finals of the 2014 Cyber Defence Competition [14] in Surabaya, East Java.

eBay recently found itself at the centre of what’s becoming a standard corporate crisis scenario when hackers accessed the personal data and passwords of all 145 million of its users. It’s been reported [15] that the breach occurred in late February to early March, with eBay making the discovery in early May and publicly announcing the hack in the past week. The ecommerce giant was roundly criticised [16] for its response to the breach, with more than 36 hours passing between the hacking announcement and eBay publishing the news on its homepage. Emails to users then appear to have gone out in dribs and drabs over some days, with eBay finally taking the decision to enforce a password change [17] on users who hadn’t already done so.

The eBay story may well be one Apple should keep in mind, with some Australian iPhone/iPad users reporting in the last 24 hours that their devices were being held hostage [18] by a hacker demanding payment via PayPal in order to restore control to the owner. While Apple is yet to provide any public comment or guidance to users, the tech community has given some standard advice: change your passwords [19]!

Finally, at the launch of the ICPC’s Cyber Maturity in the Asia Pacific Region report [20], ICPC Director Toby Feakin sat down with Minister for Communications Malcolm Turnbull to discuss the findings of the study and how Australia rated against the region. The interview is now online [21].

David Lang is an intern in ASPI’s International Cyber Policy Centre.



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-28/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2014/03/cyber-logo-1024x385.jpg

[2] solid run-down on developments: http://www.abc.net.au/news/2014-05-20/enter-the-cyber-dragon-cyber-espionage/5465176

[3] major change of strategy and policy: http://www.washingtonpost.com/world/national-security/indictment-of-pla-hackers-is-part-of-broad-us-strategy-to-curb-chinese-cyberspying/2014/05/22/a66cf26a-e1b4-11e3-9743-bb9b59cde7b9_story.html?wpmk=MK0000205

[4] hit back at claims: http://www.theguardian.com/world/2014/may/27/china-demands-halt-unscrupulous-us-cyber-spying?CMP=twt_gu

[5] concluded: http://www.aspistrategist.org.au/enough-is-enough-united-states-v-chinese-hackers/

[6] noted: https://twitter.com/RidT/status/468675536781582336

[7] comprehensive interview: http://www.vox.com/2014/5/19/5731696/chinese-hackers-cyberespionage-theft-cybercrime

[8] last week announced: http://www.justice.gov/usao/nys/pressreleases/May14/BlackshadesPR.php

[9] commentary on BlackShades: http://www.washingtonpost.com/news/morning-mix/wp/2014/05/20/5-scary-things-about-blackshades-malware/?tid=pm_national_pop

[10] Krebs on Security: http://krebsonsecurity.com/2014/05/blackshades-trojan-users-had-it-coming/

[11] LulzSec group: http://en.wikipedia.org/wiki/LulzSec

[12] 26-year prison term quashed: http://www.bloomberg.com/news/2014-05-27/ex-anonymous-hacker-gets-no-additional-prison-time-for-crimes.html

[13] this week reported: http://www.thejakartapost.com/news/2014/05/25/creating-embryonic-cyber-defense-force.html

[14] 2014 Cyber Defence Competition: http://www.thejakartapost.com/news/2014/05/25/surabaya-hacker-convention-courts-white-hatsconverts-black-hats.html

[15] reported: http://www.theaustralian.com.au/business/latest/ebay-had-no-idea-that-customer-data-was-compromised/story-e6frg90f-1226933565272

[16] roundly criticised: http://www.lifehacker.com.au/2014/05/ebay-demonstrates-how-not-to-handle-being-hacked/

[17] enforce a password change: http://www.lifehacker.com.au/2014/05/ebay-hack-now-you-will-be-forced-to-change-your-password/

[18] being held hostage: http://www.smh.com.au/digital-life/consumer-security/australian-apple-idevices-hijacked-held-to-ransom-20140527-zrpbj.html

[19] change your passwords: http://blogs.computerworld.com/cybercrime-and-hacking/23953/how-defend-against-apples-oleg-pliss-icloud-attack

[20] Cyber Maturity in the Asia Pacific Region report: https://www.aspi.org.au/publications/cyber-maturity-in-the-asia-pacific-region-2014

[21] now online: https://www.youtube.com/watch?v=SQrNG0FbIow&feature=youtu.be

Copyright © 2024 The Strategist. All rights reserved.