Category Archive For "cybersecurity"
Sony hack has flooded my news feed in recent weeks, everyone talking about how it was done, why, whom to blame, the trails which lead to North Korea and the politics around it. I’ve been following the story from the first report with an unexplained curiosity and was not sure why since I read about hacks all day long.
A word of explanation about my “weird” habit of following hacks continuously, being a CTO of the Ben-Gurion University Cyber Security Labs comes with responsibility, and part of it is staying on top of things:)
Later on, the reason for my curiosity became clear to me. As a background, to the ones who are deep in the security industry, it is already well known although not necessarily spoken out loud that attackers are pretty far ahead of enterprises regarding sophistication. The number of occurrences of reported cyber attacks in recent two years shows a steep upward curve and if you add to that three times non-reported incidents than anyone can see it is exploding. And although many criticized Sony for their wrong security measures still I don’t think they are the ones to blame. They were caught in a game beyond their league. Beyond any enterprise league.
The reasons attackers have become way more successful are:
- They know how to better disguise their attacks, using form changing techniques (polymorphism) and others.
- They know quite well the common weaknesses in enterprises IT. You can install almost any piece of software in your lab and just look for weaknesses all day long.
- They have more money to pour into learning the specifics of their targets and thanks to that they build elaborated and targeted attacks. In the case of state-sponsored attacks, the funds are unlimited.
- Defensive technologies within the enterprise are still dominated by tools invented ten years ago, back then attacks were more naive if such can be said. Today we are in a big wave of new emerging security technologies which can be much more effective though enterprises enough time to get adopted.
So it is fair to say that enterprises are in a way sitting ducks for targeted attackers and I am not exaggerating here.
And the Sony story was different than others for two main reasons:
- The source of attack is allegedly originated and backed by a specific nation. And I am saying allegedly because unless you found the evidence in the computers of someone you can’t be sure and even then that person could have been entrapped by the real attackers. Professionals can quite easily cover up their traces, and the attackers here are professionals.
- The results of the attack are devastating, and their publicity turned them into a nightmare for any CEO on earth. Some warning sign to the free world.
And Sony due to their bad luck got caught in the middle.
Image is taken from http://www.politico.com/story/2014/12/no-rules-of-cyber-war-113785.html
The End of Superpowers
From a high-level view, it does not matter whether it was North Korea or not. The fact that such an event happened where potentially a state attacked a private company and its consequences and lack of ramifications are quite clear then this opens the path for the future to happen again and again and that what’s makes it a game changer. Every nation in the world understood now they have got a free ticket to a new playground with different rules of engagement and more important different power balance.
In the physical world power has always been attributed to the amount of firepower you’ve got, and naturally, the amount of firepower has a tight correlation with the economic strength of the nation. The US is a superpower. Russia is a superpower. In the cyber world these rules do not necessarily apply where you can find a small group of very smart people, and with very simple cheap tools they can wreak havoc on a target. It is not easy but possible. The attackers many times are only limited by their creativity and nothing else. In the cyber world, size matters less.
Our lifestyle and lifeblood have become dependent on IT, our electricity, water, food, defense, entertainment, finance and almost everything else is working only if the underlying IT is functioning properly. Cyber warfare means attacking the physical world by digital means and the results can be no less devastating than any other type of attack. They can be worse since IT also presents new single points of failure. So if cyber wars can cause harm as real wars and size matter less wouldn’t that mean the rules of the game have changed forever?
Question of Responsibility
As soon as I heard that North Korea might be responsible for the attack I understood that Sony was caught into an unfair game and the big question is about the role of the government in defending the private sector, how and to what extent. Going back again to the physical world, in the case of a missile that is launched from North Korea onto the headquarters of Sony then the story and reaction were very much different and predictable. This comparison is valid since the damage which can be caused by such missile to the company is probably lesser from the economic perspective, not taking into account, of course, human casualties. I am not saying cyber attacks can’t cause casualties; I am just saying that this one did not.
So why is there a difference in the stance of the US government? Why did Sony not ask for help and nationwide defense?
The era of cyber warfare removes the clear distinction between criminal acts vs. nation wise offensive acts and a new line of thought should emerge.
So what the future holds for us?
- A big wave of cyber attacks coming from everywhere on the globe. The “good” results of this attack will surely provide a sign of hope for all the people in the world who felt inferior from a military perspective. The attackers always go to the weakest links, so we will see more enterprises being attacked like Sony in a more severe way. A long, complicated, stealthy war.
- A big wave of security technologies which aim to solve these problems, coming from the private and government sector. Security startups and established players in a way “enjoy” these developments where the need for new solutions is uprising steeply. I know personally some startups in Israel which can take the current advantage attackers enjoy technologies such as polymorphic cyber defense. I will elaborate on that in a future post since it deserves one on its own.
- A long debate about who is responsible for what and what measures can be taken meanwhile – cutting down the internet across the globe won’t help anyone since there is today many ways to launch attacks from different geographic places, so location doesn’t matter anymore. It won’t be easy to create a solution which will be effective on the one hand and not limit the freedom to communicate on the other hand.
Meanwhile, you can gaze a bit at the emerging battleground
Taken from a live attacks monitor on IPVKing
The new war on the rich desktop client is being won easily! by Adobe Air. You would expect Microsoft to win it swiftly with all their expertise and real estate on desktops but somehow it is being played by them so cumbersomely. Microsoft first tried to chase the flash in-browser capabilities with their own version …
Recently I got deeply interested into rich Internet technologies such as Adobe Air and Microsoft Silverlight and it is hard to not see the trend of returning to good old desktop applications with one big twist – the web included. These rich desktop applications are naturally integrated into the web with its rich services, content …
End of year is full of posts about how all startups and CEOs (now after the market meltdown) are going to be focused in 2009 on revenues, efficiency, listening to customers, making better products and more… Just the other day I read Some startup CEOs’ New Years resolutions where most resolutions sound like boiler plated …
Recent announcement of new XML document format that will be supported by Office 12 – Scobleizer: Microsoft Geek Blogger – will make life easier for anti virus vendors that work very hard to look for viruses in current proprietary MS-Word file format. Virus writers will find it very hard to hide in a text file …
"Average blogger household income is $57,900 According to Forrester Research, bloggers tend to be affluent (average household income: $57,900), influential with peers, and broadband-connected. 25% of all bloggers are ages 18-24 – this group is 9 times more likely to have their own blogs." itfacts.biz
Amanda Watlington relates to USAToday article on Blogging and CEO on a post Blogs and Feeds: CEO Blogs — Where Angels(?) Fear to Tread. I am a CEO of a new venture company and a blogger for the last four months and I wanted to write down what do I get from it: 1) Feedback …
I am writing many times on strategies and competition related to Microsoft and I wanted to clear the reason why I relate to this company a lot and why I am not on their side with my advice especially when it comes to competition with new ventures: 1) To put it up front I think …