PolitiHack, Or How I Learned to Stop Worrying About Russians Influencing the US Election and Learned to Love Cybersecurity

December 23, 2016 at 4:12 pm | Posted in cybersecurity, Knowledge | 2 Comments
Tags: , , , , , , , , , , , , , ,

Hackitivism and cyberespionage are certainly nothing new, especially emanating from Russia. But the 2016 US presidential election was a swift education for Americans and the watching world regarding the widespread consequences of a successful  APT (advanced persistent threat). A joint statement issued by the Department of Homeland Security and the Office of the Director of National Intelligence on Election Security stated that the “U.S. Intelligence Community (USIC) is confident that the Russian Government directed the recent compromises of e-mails from US persons and institutions, including from US political organizations” (emphasis ours).

Thanks to the detailed reporting from the New York Times, the fog of war is beginning to clear and the full extent of the cyberattack has become clear. And what is increasingly apparent is that at every stage, cybersecurity training could have significantly mitigated or (perhaps) even prevented portions of the attack altogether.

kaperskythreatmap

Real-time cyberthreat map from Kapersky Lab

Enter the low-rung MIS contractor hired by the DNC — Yared Tamene.  He claims no cybersecurity expertise, much less any cybersecurity-related certification like GSEC, CASPCISSP, CEH or CFR. So it’s hardly appropriate to assign him the brunt of the blame. Instead, we should use his example to learn how cybersecurity knowledge and skills could have better informed the fateful decisions that he, and many others, made along the way.

In the fall of 2015, the FBI noticed some unusual outgoing network traffic from the DNC network, suggesting that at least one computer was compromised. The early forensics linked the compromise to a known Russian cyberespionage group going by the moniker “the Dukes” (AKA “Cozy Bear” and “APT29”) , who had in just the last few years, penetrated the White House, State Department and Joint Chiefs of Staff email systems. A special agent picked up the phone, called Tamene, and told him what they knew.

Before we even get to Tamene’s response, any trained cybersecurity first responder knows why the FBI called via phone rather than emailing their dire message. Communication protocol during a security incident should be out-of-band, meaning outside of the primary communication channels (primarily network where the attacker could be listening). Ironically, Tamene was convinced that the FBI call was a hoax, and after repeated calls over the new few months, he ignored the urgency. In November, the FBI even confirmed with Tamene that known malware was routing data to servers located in Moscow.

Continue Reading PolitiHack, Or How I Learned to Stop Worrying About Russians Influencing the US Election and Learned to Love Cybersecurity…

Doing it for the LULZ?

June 21, 2011 at 4:38 pm | Posted in Certification Paths, Cisco, CompTIA, Technical Tips | 2 Comments
Tags: , , , , , , , , ,

Recently, Citibank announced that hackers stole personal information from about 200,000 credit card customers. Over the past year, a number of high profile companies have been attacked, including Sony being hacked for the sixth time. As cyberattacks are reportedly on the rise, the FBI, Commerce Department, and Attorney General are calling for increased cyber-security actions in the U.S.

This frenetic response may seem overwhelming to some outside observers, but to security experts in the IT industry who have decried “lax security policies at high-profile organizations,” this situation comes as no surprise. The sheer frustration that many in the security community have felt for years seems to be  finding its outlet at last.

Case in point: LulzSec – the now-infamous hacker group responsible for breaching Sony, Nintendo, PBS, Fox, and the FBI. They targeted Fox because they didn’t like them, PBS because of a FRONTLINE story, the FBI because of their attitude on hacking, and Nintendo and Sony just for fun. When a small security firm out of Nebraska posted a hacking contest for $10,000, LulzSec altered the home page and added this text:

DONE, THAT WAS EASY. KEEP YOUR MONEY WE DO IT FOR THE LULZ

Continue Reading Doing it for the LULZ?…

Blog at WordPress.com.
Entries and comments feeds.

%d bloggers like this: