- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on August 19, 2015 @ 12:30

Cyber wrap [1]

The release of the personal information of 1,500 people [2] by Islamic State (IS) Hacking Division was one of the more prominent cyber stories this week. IS claimed it had hacked sensitive databases [3] to obtain the names, email addresses, passwords and telephone numbers of these individuals, mostly US Defense [4] personnel, and posted them on Twitter in the hope of encouraging ‘lone wolf’ attacks. Interestingly, the online ‘hit list’ included the details of eight Australians, including ADF personnel and a Victorian MP. However, doubt has been cast over the legitimacy of the hack, with military officials [4] stating that the passwords and emails don’t satisfy military security requirements. Instead, it’s suspected the list was collated from open-source [5] information and previous hacks, casting further doubt on IS’s cyber expertise.

Saudi Arabia became the victim of a more legitimate hacking incident on Friday; however its perpetrators appear to have had ‘good intentions’. [6] Around 24 Saudi government websites [7] were taken down by a group called ‘Cyber Emotion’ in an attack that lasted several hours. They claim the hack was a response to the government ignoring [8] the group’s previous warnings over the Kingdom’s poor cyber security. Cyber Emotion temporarily took over educational, municipal and health-related websites [9], leading visitors to a page that warned ‘had it been hacked by enemies, your personal information, emails and registration data would have been compromised’. This should be an important lesson for Saudi officials, who were the victims of ‘the biggest hack in history [10]’, when malware brought down 35,000 computers at the state-owned Saudi Aramco oil company in 2012.

Last week, India and the US completed their formal Cyber Dialogue [11] at the US State Department in Washington DC. Discussions took place between US Cybersecurity Coordinator Michael Daniel and India’s Deputy National Security Advisor Arvind Gupta. They addressed a broad range of issues including threat assessment, information sharing and incident management. In the process, the pair identified the potential for increased collaboration [12] in capacity building, combating cybercrime and internet governance. In addition to government-to-government discussions, the delegations also addressed the connection between cyber security and the digital economy with representatives from the private sector [13]. India’s ascent as one of Washington’s top cyber allies is significant [14] by virtue of its strategic weight when compared with the US’s key cyber challengers such as China, Russia, and Iran.  This bilateral dialogue was the fourth in its series, with the next round announced to take place in Delhi in 2016.

A study by City University London scholars, released last week, reveals that the BitTorrent protocol is vulnerable to Distributed Reflective Denial of Service (DRDoS) attacks. The paper, P2P File-Sharing in Hell [15], explains how common file-sharing protocols can be used to amplify a cyber-attack’s impact. Popular BitTorrent clients, such as uTorrent and Vuze boast millions of users, but operate with User Datagram Protocol (UDP) that lacks address-spoofing defences. As a result, a malicious actor can send traffic to fellow file-sharers, having replaced their own sender IP address with the ‘spoofed’ address of a target computer, so that the nefarious message is significantly amplified before being ‘reflected’ [16] onto a victim. Thus, while traditional Distributed Denial of Service attacks [17] require hackers to have already compromised a cohort of ‘zombie’ computers, this vulnerability facilitates attacks of similar scale without the preliminary work. Instead, a would-be hacker has access to a ready-made group of vulnerable ‘reflectors’. This exploit offers substantial hacking benefits [18] including protected anonymity and amplified traffic [19] by up to 120 fold.

Hillary Clinton has handed over [20] her personal email server, as well as a USB containing copies of the emails that she already provided to the FBI in December 2014. This is in response to the uproar [21] surrounding allegations that she had used a private computer to handle classified information during her time as Secretary of State. Last week, the intelligence community’s Inspector General informed Congress [22] that several violations of security policy had been found in Clinton’s personal computer. Intelligence officials have only assessed 20% of the 30,000 emails provided, over 300 [23] of which have been flagged as potentially containing confidential information. This investigation has a long way to go, and the impact it will have on Clinton’s presidential aspirations remain to be seen.

Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-84/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2015/08/8484119632_48bac5d5fd_z.jpg

[2] 1,500 people: http://www.smh.com.au/national/justice-minister-confirms-islamic-state-hack-of-australians-20150812-giy0li.html

[3] sensitive databases: http://www.hackread.com/isis-affiliated-hackers-hack-us-govt/

[4] mostly US Defense: http://www.militarytimes.com/story/military/pentagon/2015/08/12/isis-hacking-group-tweets-support-lone-wolf-attacks-military-personnel/31550919/

[5] open-source: http://www.gizmodo.com.au/2015/08/isis-sucks-at-hacking/

[6] ‘good intentions’.: https://www.hackread.com/saudi-government-websites-hacked/

[7] 24 Saudi government websites: http://www.aljazeera.com/news/2015/08/saudi-websites-hacked-intentioned-group-150815194012877.html

[8] government ignoring: http://www.arabianbusiness.com/saudi-cyber-group-hacks-into-23-gov-t-websites-highlight-poor-security-602831.html#.VdKm2rKqpBd

[9] websites: http://www.saudigazette.com.sa/index.cfm?method=home.regcon&contentid=20150816253577

[10] the biggest hack in history: http://money.cnn.com/2015/08/05/technology/aramco-hack/

[11] Cyber Dialogue: https://www.whitehouse.gov/the-press-office/2015/08/14/joint-statement-2015-united-states-india-cyber-dialogue

[12] increased collaboration: http://zeenews.india.com/news/net-news/india-us-to-enhance-cyber-security-cooperation_1646781.html

[13] private sector: http://gadgets.ndtv.com/internet/news/india-us-to-enhance-cyber-security-cooperation-727836

[14] significant: http://thehill.com/policy/cybersecurity/251150-us-india-pledge-cyber-cooperation-amid-rising-threats

[15] P2P File-Sharing in Hell: https://www.usenix.org/system/files/conference/woot15/woot15-paper-adamsky.pdf

[16] reflected’: http://www.itnews.com.au/News/407944,bittorrent-can-be-exploited-for-large-scale-dos-attacks.aspx

[17] traditional Distributed Denial of Service attacks: http://news.softpedia.com/news/drdos-attacks-can-now-propagate-via-bittorrent-clients-489350.shtml

[18] substantial hacking benefits: http://arstechnica.com/security/2015/08/how-bittorrent-could-let-lone-ddos-attackers-bring-down-big-sites/

[19] amplified traffic: https://torrentfreak.com/bittorrent-can-be-exploited-for-dos-attacks-research-warns/

[20] handed over: http://www.thedailybeast.com/articles/2015/08/12/the-spy-satellite-secrets-in-hillary-s-emails.html

[21] uproar: http://www.bbc.com/news/world-us-canada-33968705

[22] informed Congress: http://www.grassley.senate.gov/sites/default/files/judiciary/upload/Classified%20docs,%2008-11-15,%20ICIG%20CN%20-%20Update%20on%20Classified%20Materials%20on%20Personal%20thumb%20drive.%20Clinton%20server.pdf

[23] over 300: http://www.theguardian.com/us-news/2015/aug/17/hillary-clinton-emails-flagged-need-review

Copyright © 2024 The Strategist. All rights reserved.