Cyber security has been a concern for the government and private sector for over a decade. The growth in the Information Technology sector in the United States has given rise to cyber crimes that leave huge losses in their wake. Data breaches have gained more attention in the news with each breach seemingly being larger than the ones that came before it. The cost of the data breaches have increased considerably with the record breaking breaches occurring in 2017 at Equifax and Uber leaking information on more than 200 million American citizens. The United States cyber security regulation comprises of directives from the Executive Branch and legislation from Congress forcing companies and organizations to protect their systems and information from cyber-attacks such as viruses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control system attacks. There are three main federal cybersecurity regulations:…
We live in an era of increasingly prevalent cybercrime. The first wave of hacking seemed to only target large companies that stored masses of sensitive data. Stories about credit card numbers and contact information being stolen from retail stores made major news headlines. These days, unfortunately, it looks as if cybercriminals have discovered the gold mine that is business data. That’s the bad news. The worse news is that too many businesses are unprepared for the size of the threat we’re now facing. Surveys show that over 50% of have no cyber protection protocols in place and 60% did nothing to increase their security after being attacked. Patrick Kelley joined Robert Frost, Scott Saugenbaum, Melody McAnally, and Barbara Allen-Watkins to discuss discovery, response, and recovery from cyber and wire fraud.
When I work with enterprise organizations in regards to their security posture, I usually run into the same scenario. The Information Security has a reduced budget and a more traditional approach to security. Unfortunately, as the global landscape of enterprise networks continues to evolve, it’s clear this approach won’t be applicable.
In a new generation of adversarial attacks, inside-out attacks are becoming more common and lateral movement through leaked exploits is the new game. As we’ve seen in the past with XP exploits – MS08-067, unpatched workstations and servers are the new “norm”.
With the new ransomware, “BadRabbit”, the attackers used EternalRomance, an exploit that bypasses security over Server Message Block (SMB) file-sharing connections, enabling remote execution of instructions on Windows clients and servers. This attack leverages the same methods revealed in the Shadowbrokers code release. NotPetya also leveraged this exploit.
In a scenario that’s become all too common these days, it seems that a subcontractor responsible for the development of F-35, JDAM, P-8, and C-130 parts and assemblies has been hacked.
Unfortunately, it wasn’t just credit card and other consumer data compromised. It was detailed information on some of the world’s major shared military defense systems – aircraft, bombs and naval vessels. Additionally, it seems that this breach has been active for a bit of time.
In fact, it was said that almost a year ago, in November 2016, by the Australian Cyber Security Centre (ACSC):
…became aware that a malicious cyber adversary had successfully compromised the network of a small Australian company with contracting links to national security projects. ACSC analysis confirmed that the adversary had sustained access to the network for an extended period of time and had stolen a significant amount of data.
The attackers had been inside the company’s network at least since the previous July, had “full and unfettered access” for several months, and exfiltrated about 30GB of data including, “restricted technical information on the F-35 Joint Strike Fighter, the P-8 Poseidon maritime patrol aircraft, the C-130 transport aircraft, the Joint Direct Attack Munition (JDAM) smart bomb kit, and a few Australian naval vessels.”
Though the company was not named, it has been described as a 50-person company with a single IT person handling all aspects of Information Technology and Security. It’s also apparent that the company was not compliant with CSC or similar regulatory frameworks, as…