STE WILLIAMS

Cyber War Game Shows How Federal Agencies Disagree on Incident Response

Former officials at DHS, DOJ, and DOD diverge on issues of attribution and defining what constitutes an act of cyber war.

RSA CONFERENCE 2018 – San Francisco – Good-natured bickering between participants of a cyber war game exercise here Tuesday showed how federal agencies both collaborate with and differ from one another when responding to incidents. The areas where opinions diverge most: how much attribution is enough to act upon, when it’s appropriate to use “kinetic” military action as part of a cyber incident response, and when a cyberattack becomes an act of war.

The discussion took place in a session called “Cyber War Game — Behind Closed Doors with the National Security Council,” mediated by CrowdStrike CTO Dmitri Alperovitch and Columbia University research scholar Jason Healey. Representing the members of the National Security Council were former high-ranking officials of US federal agencies that are regular attendees of the council.

Playing the role of Department of Homeland Security was Suzanne Spaulding, former under secretary for the National Protection and Programs Directorate at the Department of Homeland Security, and currently senior adviser for the Center for Strategic and International Studies. Playing the role of Department of Justice was John Carlin, former assistant attorney general for the DOJ’s National Security Division and currently a partner at Morrison Foerster LLP, where he chairs its global risk and crisis management team. Playing the role of Department of Defense was Eric Rosenbach, former chief of staff to the secretary of defense, and currently co-director of the Belfer Center for Science and International Affairs at Harvard University.

The exercise proposed a scenario in which the US had uncovered military dimensions of the Iranian nuclear program and discovered that Iran’s pursuit of a nuclear weapons program posed a threat. In addition, a series of cyber campaigns began, including a leak of documents from previous intrusions into Congress and wiper malware destroying those networks.

Later in the exercise, attribution for the first cyberattacks is confirmed to be from Iran. New attacks begin, including in other countries (critical infrastructure in Israel), and a compromise of a subway control system in Los Angeles that forced one train crash that caused fatalities.

As Carlin (DOJ) explained, there are two primary objectives in this exercise: “Stop the cyberattacks. And stop the nuclear development.” All participants agreed that the cyberattacks are the more immediate threat to be contained.

However, they differed somewhat on how to contain the threat.

Spaulding spoke about reaching out to more potential victims, gathering forensic data and sharing threat intelligence with state transportation authorities. Carlin spoke about determining attribution, setting up surveillance, and determining what legal response and sanction actions are available to the government depending upon what “red lines” had been crossed — for example, what kind of response had the US government already stated it would take if a cyberattack had caused bodily harm to a US citizen, as this had. 

Rosenbach took it further: “This is an armed attack against the United States,” he said, noting that if a train had crashed because of an explosive device instead of a cyberattack, nobody would question that it was anything else. Loss of life or significant economic consequences will change the nature of the response, he said.

The participants also diverged on the topic of attribution, with Rosenbach stating that we’ve been in the habit of delaying response because we require too much confirmation of attribution.  

Spaulding said, “The conversation about attribution will be happening not just in the United States,” noting that other nations may also have a vested interest, either politically or as potential victims. 

Rosenbach added that other nations, particularly those that have already suffered from attacks by Iran, may be “champing at the bit” to respond in kind.

Spaulding said, “There will be this instinct that we need to charge forward, and that might be the right answer … but we need to consider the potential impact on private entities.”

In terms of this war-gaming exercise, Rosenbach said that “the nuclear threat should shape response,” but participants should aim to meet “cyberattacks with cyber solutions.” However, he added that “adversaries need to know when you’re serious about taking action.”  

Carlin told Rosenbach that regardless of what response the US decided to make to Iran’s maneuvers, “I would want the secretary of defense to tell the president that the first message should not come through Twitter.”

 

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the security track here. Register with Promo Code DR200 and save $200.

 

Related Content:

 

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad … View Full Bio

Article source: https://www.darkreading.com/operations/cyber-war-game-shows-how-federal-agencies-disagree-on-incident-response/d/d-id/1331574?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Stopping Bots and Credential Stuffing: A Smarter Strategy

Patrick Sullivan, Senior Director Security Strategy at Akamai Technologies, explains why cybersecurity teams need better mechanisms for controlling bot activity – and why all bots are not created equal.

Article source: https://www.darkreading.com/stopping-bots-and-credential-stuffing-a-smarter-strategy/v/d-id/1331578?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Leveraging Threat Intelligence across Infosec Roles

Allan Liska, Senior Security Architect at Recorded Future, believes everyone in the infosec team – including vulnerability management and threat response staff – can take greater advantage of available threat intelligence to more effectively and efficiently mitigate risk.

Article source: https://www.darkreading.com/leveraging-threat-intelligence-across-infosec-roles/v/d-id/1331579?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Practically Applying Threat Intelligence to Your Business

Travis Farral, Director of Security Strategy at Anomali, believes cybersecurity teams can operate much more efficiently by better identifying the specific threats that endanger their environment – and by better understanding the potential impacts of those specific threats.

Article source: https://www.darkreading.com/practically-applying-threat-intelligence-to-your-business/v/d-id/1331580?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Enabling Appropriate User Access in a "Zero Trust" World

Bill Mann, Chief Product Officer at Centrify, suggests some strategies for securing today’s perimeter-less enterprise environments – including stronger enforcement of well-defined policies for user access, integration of security into DevOps processes, and smarter use of ML for anomaly detection.

Article source: https://www.darkreading.com/enabling-appropriate-user-access-in-a--zero-trust--world/v/d-id/1331581?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Keeping the Business Safe Across Hybrid Cloud Environments

Aggressive cloud adoption increases threat surface and makes it more difficult for infosec teams to keep track of what the business is doing. Donald Meyer, Head of Data Center and Cloud at Check Point Software, explains how infosec teams can more effectively mitigate risk without hampering business agility.

Article source: https://www.darkreading.com/keeping-the-business-safe-across-hybrid-cloud-environments/v/d-id/1331582?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Beating Zero-Payload/Fileless Attacks with Unified EPP/EDR


To InformationWeek
Network Computing
Darkreading





Dark Reading | Security | Protect The Business - Enable Access

Search

To cope with today’s fileless endpoint attacks – especially those that aren’t precisely similar to previously known exploits – Tomer Weingarten and Nicholas Warner of SentinelOne suggest a unified EPP/EDR approach that includes visibility into the dangers lurking within encrypted network traffic.



‘);
}



‘);
}

Comments

News

News

News

Register for Dark Reading Newsletters

Live Events

Webinars


More UBM Tech
Live Events

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

6 Comments

1 Comments

1 Comments

1 Comments

0 Comments


Cartoon

Latest Comment: Ed didn’t even bother – after all, it was only a 1000 bolivar note.

How to Cope with the IT Security Skills ShortageMost enterprises don’t have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.

Reports

[Strategic Security Report] Navigating the Threat Intelligence Maze

[Strategic Security Report] Navigating the Threat Intelligence Maze

Most enterprises are using threat intel services, but many are still figuring out how to use the data they’re collecting. In this Dark Reading survey we give you a look at what they’re doing today – and where they hope to go.

Dark Reading - Bug Report
Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database

CVE-2017-0290Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within …


CVE-2016-10369Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).


CVE-2016-8202Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version…


CVE-2016-8209Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.


CVE-2017-0890Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

googletag.display(‘div-gpt-ad-961777897907396673-15’);

Information Week

UBM Tech

Optimizing the Security Awareness of Your End-Users

End-users can be the weakest link in your infosec defense. But according to KnowBe4 founder and CEO Stu Sjouwerman, there is something you can do about that – if you implement the right behavioral diagnostics and focus your training needs on individual users’ actual weaknesses.

Article source: https://www.darkreading.com/optimizing-the-security-awareness-of-your-end-users/v/d-id/1331584?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

The Role of KPIs in Incident Response

Using KPIs can have a positive impact on the tactical and strategic functions of a security operations program.

When chief marketing officers want to know if an expensive new campaign inspired people to buy their company’s product, they look at the key performance indicators (KPIs) defined for the campaign. When chief information security officers want to know if the current mix of threat prevention and detection technologies are effective, they should see what their security operations program’s KPIs are telling them.

KPIs typically are used to measure the success or failure of a business goal, function, or objective. They also provide actionable information that is helpful for decision-making. While KPIs are most commonly used in business categories such as sales, financial, project management, and marketing, they can be useful in security operations as well.

The measurement and analysis of well-considered KPIs can have a positive impact on both the tactical and strategic functions of a security operations program. KPIs help ensure that the program remains effective and that any process or technology gaps are addressed appropriately.

What a security program should measure to develop meaningful KPIs varies from one organization to another. Start by identifying which security operations goals or functions are most critical to the program. Each KPI should have meaning to the organization, add value to the security program, and be “SMART”: Simple, Measurable, Actionable, Relevant, and Time-based.

Every successful security operations program has common components. Therefore, KPIs should be targeted at assessing at least some of the following:

Analyst skills: Utilizing KPIs to measure analysts’ current skill sets and comparing them to the organization’s present needs can identify gaps in training and personnel. Addressing gaps can improve the overall readiness of the security operations team.

Key risks: Organizations face myriad risks and have a limited budget to address them. Using KPIs to help identify which risks pose the greatest potential impact allows the security team to feed actionable information back into the overall risk assessment process, thus maximizing the effectiveness of limited time and financial resources.

Detection success: KPIs that measure the performance of prevention and detection technologies can identify gaps where additional or different technology may benefit the organization, as well as ways to tune existing technologies to increase efficiency.

Mitigation success: Once a security incident has been identified, organizations often use technology in the mitigation process. KPIs measuring the performance of mitigation technologies can identify gaps where the organization could benefit from additional and/or better-tuned technology.

Process success: Utilizing KPIs to measure the performance of a security program’s processes and procedures can help ensure they remain optimized and as effective as possible against a range of security incidents.

Workload: Analysts who are overworked are more likely to take shortcuts or miss key indicators of security incidents. KPIs that measure analyst workload can identify staffing inefficiencies that could result in risk to the organization.

The security operations team can brainstorm which KPIs to track; there will be no shortage of suggestions. The key is choosing KPIs that will have a real, practical impact on the organization’s security program. Here are a few examples that can inspire ideas to help an organization identify its own important KPIs.

All facets of business are measured with KPIs these days. Even security operations can benefit from deriving actionable information from KPIs and applying it to improve incident response programs.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the Interop ITX 2018 agenda here.

John Moran is a security operations and incident response expert. He has served as a senior incident response analyst for NTT Security, computer forensic analyst for the Maine State Police Computer Crimes Unit and computer forensics task force officer for the US Department of … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/the-role-of-kpis-in-incident-response/a/d-id/1331516?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Facebook: 3 reasons we’re tracking non-users

It should have been an easy question to answer.

It came from Florida Rep. Kathy Castor during the House’s questioning of Facebook CEO Mark Zuckerberg last week, when she asked:

You are collecting personal data on people who are not Facebook users. Yes or no?

There was no yes or no to be had, so she tried again:

You watch where we go. Isn’t that correct?

Zuckerberg’s response:

Everyone has control over how that works.

She wasn’t the only member of the House Energy and Commerce Committee to press the CEO about how much information it collects about both users and non-users. As Castor put it, “It’s practically impossible these days to remain untracked in America,” and it’s led to a “devil’s bargain” in which people are “spied on” and tracked even after they leave the platform.

On Monday, Facebook finally coughed up the answer. It’s no shocker: the answer is yes.

Yes, Facebook tracks both users and non-users across websites and apps, according to a post written by David Baser, Product Management Director.

It does so for three main reasons, he said:

  1. To provide its services to the sites or apps;
  2. To improve safety and security on Facebook; and
  3. To enhance its own products and services.

From the post:

When you visit a site or app that uses our services, we receive information even if you’re logged out or don’t have a Facebook account. This is because other apps and sites don’t know who is using Facebook.

Facebook is far from the only online service to do this. Twitter, Pinterest and LinkedIn have similar Like and Share buttons, Google has a popular analytics service, and Amazon, Google and Twitter all offer login features, Baser said.

In fact, most websites and apps send the same information to multiple companies each time you visit them.

Baser emphasized that “We don’t sell people’s data. Period.” And, just as Zuckerberg repeatedly told Senators and Representatives last week, Baser said that Facebook is focused on putting users in control of their data and that the company is trying to be more transparent about the data it collects and how that data is used.

Whether it’s information from apps and websites, or information you share with other people on Facebook, we want to put you in control – and be transparent about what information Facebook has and how it is used. We’ll keep working to make that easier.

That transparency doesn’t extend to letting non-users get at the data Facebook collects about them, however.

On Wednesday, Zuckerberg responded to questions from Rep. Ben Luján by explaining that Facebook collects “data of people who have not signed up for Facebook” for “security purposes,” explaining how it helps to prevent scraping:

…in general we collect data on people who have not signed up for Facebook for security purposes to prevent the kind of scraping you were just referring to … we need to know when someone is repeatedly trying to access our services

The CEO didn’t explain what, if anything, else Facebook might doing with the data it gathers on non-members.

Lawmakers and privacy advocates immediately responded, with many saying that Facebook needed to develop a way for non-users to find out what the company knows about them.

On Friday, Facebook said it had no plans to build such a tool, according to Reuters.

In his post on Monday, Baser added a bit of detail around the security purposes behind its collection of non-users’ data:

If someone tries to log into your account using an IP address from a different country, we might ask some questions to verify it’s you. Or if a browser has visited hundreds of sites in the last five minutes, that’s a sign the device might be a bot.

Baser explained that one of the services Facebook provides to websites and apps is Audience Network: a service that lets advertisers create ads on Facebook that show up elsewhere in cyberspace. Advertisers can also target non-users with a tiny but powerful snippet of code known as the Facebook Pixel: a web targeting system embedded on many third-party sites. Facebook has lauded it as a clever way to serve targeted ads to people, including non-members.

Conspicuous by its absence from the blog post was any mention of shadow profiles: profiles of people who’ve never signed up for Facebook.

European countries have been battling with Facebook over shadow profiles for years. In 2011, a Irish privacy group sent a complaint about shadow profiling – collecting data including but not limited to email addresses, names, telephone numbers, addresses and work information – from non-members.

More recently, in the latest installment in a long-running privacy case, a Belgian court ordered Facebook to stop profiling non-members in the country or face a daily fine.

But what, exactly, can non-users do about this tracking?

Facebook sent this statement to Reuters:

This kind of data collection is fundamental to how the internet works.

There are basic things you can do to limit the use of this information for advertising, like using browser or device settings to delete cookies. This would apply to other services beyond Facebook because, as mentioned, it is standard to how the internet works.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/qc601EzKOkI/