. | . |
Latest mass hacks highlight challenge for Biden administration By Rob Lever Washington (AFP) March 10, 2021 The potentially devastating hack of Microsoft email servers, the second major cyberattack in months, adds pressure to the Biden administration as it weighs options for "hacking back" or other moves to protect cyberspace. Security analysts say stronger actions are needed to deter the attacks which exploited vulnerabilities in corporate and government networks and opened opportunities for espionage and cybercrime. The latest hack exploiting flaws in Microsoft Exchange service is believed to have affected at least 30,000 US organizations including local governments and was attributed to an "unusually aggressive" Chinese cyberespionage campaign. The news comes on the heels of revelations that Russia was probably behind the massive SolarWinds hack that shook the government and corporate security last year. "These are two very big incidents and represent a significant litmus test for the early stages of the Biden administration," said Frank Cilluffo, a former homeland security adviser in the George W. Bush administration who is now the director of Auburn University's McCrary Institute for Cyber and Critical Infrastructure Security. "A response is important because it sets a precedent and sets the tone for the administration's response to unacceptable cyber behavior." Cilluffo added that any action would not simply respond to the perpetrators, noting that "everyone else is watching, and other state and nonstate actors are going to pay attention to our ability to respond." James Lewis, a cybersecurity specialist with the Center for Strategic and International Studies, said the two incidents suggest "that our cybersecurity strategy isn't working against our most skilled and dangerous opponents." "This means that the espionage advantages are endless," Lewis said. "The Biden team understands this and is trying to change things, but we are far from having a solution." - Hacking back? - Until recently, the notion of "hacking back" counterstrikes was considered too politically risky under international norms. But a 2019 agreement among 28 countries set a legal framework for such retaliation, Lewis noted. "Hacking back by private entities is still illegal, but the case has been made that it is legal for a state to do so in response to an attack," he said. R. David Edelman, a former digital security adviser to the Obama administration who is now on the faculty at the Massachusetts Institute of Technology, said the new administration faces difficult choices "The administration has said it wants to impose costs -- and it's unclear what costs are commensurate. Just like with Solar Winds, the private sector is going to have to pay for another state's adventurism," Edelman said. "Indictments? Sanctions? They only have so much effect when we're talking about agents safely ensconced in a foreign security state thousands of miles away." - 'Surgical' response - Microsoft said a state-sponsored hacking group operating out of China is exploiting previously unknown security flaws in its Exchange email services to steal data from business users. The hacking group, which it has named "Hafnium," is a "highly skilled and sophisticated actor," according to the company. This comes following revelations that hackers managed to compromise and instal malware on a piece of security software developed by SolarWinds which is used for management and supervision of networks at many large companies and several US government agencies. The attack was discovered by cybersecurity company FireEye, which, along with SolarWinds, has pointed the finger at hackers linked to the Russian government. Last month, Anne Neuberger, the senior White House cybersecurity advisor, said her team was looking "holistically" at retaliation. "This isn't the only case of malicious cyber activity of likely Russian origin, either for us or for our allies and partners," she said. Cilluffo said any response must be carefully crafted, like any military action, to punish the intended targets without harming innocent bystanders. That could mean economic, diplomatic or military measures, he said. "This can't be treated as a cyber incident alone," he said. "It has to be woven into the broader geopolitical and national security machinery of the US government." This could mean different kinds of responses for Russia, China, North Korea or others believed to be supporting hacker activity. "A computer network attack is clearly an instrument in our toolbox," he said. "But we want to do it surgically, discriminately and obviously have impact on those we want to have impact on."
European banking regulator says it has resolved hack Paris (AFP) March 9, 2021 The European Banking Authority, a key EU financial regulator, said Tuesday it has resolved a hack of Microsoft's email system and is operating normally. Following a thorough investigation, the Paris-based EBA determined that the extent of the breach "was limited" and that confidentiality of its systems and data "has not been compromised". "Thanks to the precautionary measures taken, the EBA has managed to remove the existing threat and its email communication services have, therefore, been resto ... read more
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |