Biodun Iginla, BBC News

Biodun Iginla, BBC News
Showing posts with label Global cyber attack. Show all posts
Showing posts with label Global cyber attack. Show all posts

Monday, April 16, 2018

U.S., Britain blame Russia for global cyber attack

April 17, 2018  03H:23  GMT/UTC/ZULU TIME
The United States and Britain on Monday accused Russia of launching cyber attacks on computer routers, firewalls and other networking equipment used by government agencies, businesses and critical infrastructure operators around the globe.
A man poses inside a server room at an IT company in this June 19, 2017 illustration photo. REUTERS/Athit Perawongmetha/Illustration
Washington and London issued a joint alert saying the campaign by Russian government-backed hackers was intended to advance spying, intellectual property theft and other “malicious” activities and could be escalated to launch offensive attacks.
It followed a series of warnings by Western governments that Moscow is behind a string of cyber attacks. The United States, Britain and other nations in February accused Russia of releasing the “NotPetya” virus, which in 2017 crippled parts of Ukraine’s infrastructure and damaged computers across the globe, costing companies billions of dollars.
The Kremlin did not immediately respond to a request for comment. But Russia’s embassy in London issued a statement citing British accusations of cyber threats from Moscow as “striking examples of a reckless, provocative and unfounded policy against Russia.”
Moscow has denied previous accusations that it carried out cyber attacks on the United States and other countries.
U.S. intelligence agencies last year accused Russia of interfering in the 2016 election with a hacking and propaganda campaign supporting Donald Trump’s campaign for president. Last month the Trump administration blamed Russia for a campaign of cyber attacks that targeted the U.S. power grid.
American and British officials said that the attacks disclosed on Monday affected a wide range of organizations including internet service providers, private businesses and critical infrastructure providers. They did not identify victims or provide details on the impact of the attacks.
“When we see malicious cyber activity, whether it be from the Kremlin or other malicious nation-state actors, we are going to push back,” said Rob Joyce, the White House cyber security coordinator.
Relations between Russia and Britain were already on edge after Prime Minister Theresa May blamed Moscow for the March 4 nerve agent poisoning of former Russian spy Sergei Skripal and his daughter Yulia in the city of Salisbury.
“This is yet another example of Russia’s disregard for international norms and global order - this time through a campaign of cyber espionage and aggression, which attempts to disrupt governments and destabilize business,” a British government spokesman said in London.
Britain and the United States said they issued the new alert to help targets protect themselves and persuade victims to share information with government investigators so they can better understand the threat.
“We don’t have full insight into the scope of the compromise,” said U.S. Department of Homeland Security cyber security official Jeanette Manfra.
The alert is not related to the suspected chemical weapons attack in a town in Syria that prompted a U.S.-led military strike over the weekend targeting facilities of the Russian-backed Syrian government, Joyce said.
Shortly after the announcement, the White House said Joyce would leave his post and return to the U.S. National Security Agency.
U.S. and British officials warned that infected routers could be used to launch future offensive cyber operations.
“They could be pre-positioning for use in times of tension,” said Ciaran Martin, chief executive of the British government’s National Cyber Security Centre cyber defense agency, who added that “millions of machines” were targeted.

Monday, May 15, 2017

Global cyber attack: who is to blame?--analysis


by Tamara Kachelmeier and Biodun Iginla, France24 Technology reporters, New York


    NEW YORK - 
    Questions are swirling over who is responsible for the security flaws exploited by hackers in the world's biggest ransomware attack to date, which crippled thousands of businesses and public organizations around the world. Here are some answers:
    - Who bears the blame? -
    Because hackers exploited a security hole in some Windows versions discovered by the National Security Agency, Microsoft says the intelligence agency bears some responsibility.
    "This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem," Microsoft president and general counsel Brad Smith said in a weekend blog post.
    Steven Weber, faculty director at the Center for Long-Term Cybersecurity at the University of California, said "the fault is pretty distributed -- there are plenty of people to blame."
    Weber said the NSA's primary mission is intelligence: "If I were sitting at the NSA I would push that argument right back to Microsoft," he argued. "They would say, 'It's our job to stockpile those weapons and use them against our adversaries.'"
    Other factors were the large number of old, outdated software programs in use and often ineffective security systems.
    Cornell University computer scientist Stephen Wicker blamed "profound ethical lapses" both on the part of the US government and the computing public.
    The flaws "were known to the NSA and CIA, but were kept secret by those organizations to be exploited for their own data collection purposes," Wicker said.
    But he added that a large number of businesses and other users failed to install a patch issued by Microsoft in March.
    "This 'free-rider' problem -- some manufacturers and users choosing to enjoy the benefits of the internet without taking the time and effort to maintain secure computing systems -- is also unethical, and is a problem that will get much worse as the Internet of Things (IoT) continues to grow," Wicker said.
    - How did hackers get this tool? -
    Microsoft effectively confirmed what many analysts have stated, that the ransomware known as "WannaCry" was designed to exploit NSA software that was leaked earlier this year by a group calling itself Shadow Brokers.
    President Vladimir Putin has said Russia -- which has been accused of cyber meddling in several countries -- had nothing to do with the massive cyberattack, and criticized the US intelligence community for creating the original software.
    But Bruce Schneier, chief technology officer for IBM Resilient Systems, has suggested that a state-sponsored actor, most likely Russia, was probably responsible for the initial hack of the NSA.
    "Whoever got this information years before and is leaking it now has to be capable of hacking the NSA and/or the CIA, and willing to publish it all," Schneier said in a recent blog post.
    "The list of countries who fit both criteria is small: Russia, China, and... and... and I'm out of ideas."
    James Lewis, a cybersecurity specialist with the Center for Strategic and International Studies, said he believes the exposure of the flaw likely "leads back to Moscow" -- but that the hackers who designed the malware are probably not Russian.
    "One of the rules in Russia is that Russian criminals are not allowed to hack Russian targets," Lewis said. "This does not fit the pattern of Russian-sponsored activity."
    "The cybercrime market is really innovative," he added, "and they are quick to take advantage of vulnerabilities."
    - What about computer security at large? -
    The attacks came a day after US President Donald Trump signed an executive order calling for improved cybersecurity in the federal government and better cooperation with the private sector.
    But few see this or any single initiative as a silver bullet.
    Weber said the attacks show the risks of an overreliance on computerized systems that are not fully secure.
    "We have built an increasingly digital society on a very insecure foundation and we are starting to see the consequences of that," he said.
    Weber warned there is no single entity capable of fixing this problem in the near future, since security depends on so many factors.
    "If you want to look for an upside, it would be this would be a wakeup call," to improve computer security, he said.
    At the same time, Weber noted that the attack could prompt more people to shun digital technology and turn back to analog systems that can't be hacked.
    Weber said there are already some signs that the public is losing confidence in the digital world as a result of security problems.
    "For Silicon Valley and technology companies, their future depends on these underlying systems working," he said.