Page Header Image

NetCentrics Blog

Cyber Weekly Roundup – April 27, 2018

By Colby Proffitt

1.) Experts describe how hacking back can be done right (April 20, 2018)

https://searchsecurity.techtarget.com/news/252439650/Experts-describe-how-hacking-back-can-be-done-right?track=NL-1820&ad=920553&src=920553&asrc=EM_NLN_94031905&utm_medium=EM&utm_source=NLN&utm_campaign=20180425_RSA%20Conference%202018:%20Can%20hacking%20back%20be%20done%20right?

Summary: The idea of hacking back — responding to attacks with offensive measures — has been a divisive topic, but a panel of experts at RSA Conference 2018 all agreed there are reasons to allow offensive counterattacks as long as they are done in smart ways.

Why it matters: There are several challenges of hacking back, the main one being attribution – knowing with absolute certainty who was responsible for an attack. One solution is designed the make any stolen data almost useless by mixing the real data with fake data. What this article doesn’t dive into, however, is how exactly that’s accomplished, whether or not it is effective, and how much it costs. What’s interesting is that Facebook, Google, and Microsoft, among others, all want to veto the Active Cyber Defense Certainty Act, which is designed to make hacking back legal – under certain parameters. This act will be one to watch – if it becomes law, it has to potential to completely change the cyber landscape.

2.) House bill would create a ‘naughty list’ for nation-state hacking groups (April 25, 2018)

https://fcw.com/articles/2018/04/25/cyber-naughty-list-bill.aspx?s=fcwdaily_260418

Summary: Last week, the Trump administration delivered a classified report to Congress outlining a new national cyber doctrine. Beyond naming the congressional committees that received the report, the White House has thus far publicly provided no additional details about the document or the strategy that it promotes.

Why it matters: The details of the strategy haven’t been made publicly available yet, but it will be interesting to see what specific methods of cyber defense are backed – from public shaming and sanctions, to more offensive tactics such as hacking back. What’s clear is that there is a very real correlation between cybersecurity and economic security – and what we can hope is that the overall strategy will support a more aggressive and proactive cyber stance.

3.) Researchers found a semi-legit way to turn an Amazon Echo into a wiretap (April 26, 2018)

https://www.cyberscoop.com/amazon-echo-wiretap-checkmarx/?utm_campaign=CyberScoop%20Daily&utm_source=hs_email&utm_medium=email&utm_content=62412306&_hsenc=p2ANqtz-9cLCw4WEHz4iLYP2rIFN7UMHKYL4qezgZ_eY_cRNqejVObN2neBO5r52wPY5m01IqHetTCh0OFVFv7_nUojRp9PMsuynIKC_eBK93okiDUHyi3T80

Summary: An Amazon Echo application created by security researchers proves how the popular smart home device can be co-opted to remotely listen to people’s nearby conversations, according to cybersecurity firm CheckMarx.

Why it matters: This is yet another example of the potential dangers introduced by IoT devices intended to provide convenience and simplicity. Although in this scenario, an end user would be required to voluntarily download the application, it’s likely just a matter of time before a malicious actor finds a way to push the bad code remotely without the user’s knowledge. Given the prevalence of this device, and other similar home devices, it’s probably best to just assume that anything you say within range might be recorded. And it’s not just home devices like the Echo, even cell phones can still record audio even when they are seemingly turned off.

4.) Hackers build a ‘Master Key’ that unlocks millions of Hotel rooms (April 25, 2018)

https://thehackernews.com/2018/04/hacking-hotel-master-key.html

Summary: If you often leave your valuable and expensive stuff like laptop and passports in the hotel rooms, then beware. Your room can be unlocked by not only a malicious staff having access to the master key, but also by an outsider.

Why it matters: Data has been in the headlines as the primary target malicious actors want to steal, but this latest vulnerability is a reminder that physical objects of value are also big targets. The good news is that researchers uncovered the vulnerability and aren’t going to release their customer software; however, they also just became a very interesting target.

5.) North Korea linked to global hacking operation against critical infrastructure, telecoms (April 25, 2018)

http://thehill.com/policy/cybersecurity/384786-north-korea-linked-to-global-hacking-operation-against-critical

Summary: A suspected North Korean hacking campaign has expanded to targets in 17 different countries, including the U.S., pilfering information on critical infrastructure, telecommunications and entertainment organizations, researchers say.

Why it matters: North Korea continues to steal data from the U.S. and other nations – and is gaining momentum with Operation GhostSecret. While McAfee has released initial findings, it’s still unclear how to halt the operation, and what North Korea plans to do with the stolen data.

pattern1

Let's work together

Contact Us
NetCentrics

NetCentrics is recognized as a leader in IT Strategy, Mission Applications, Infrastructure Services, Cloud, Service Delivery and Cybersecurity for federal agencies.

© 2018 NetCentrics Corporation. All rights reserved. Various trademarks held by their respective owners.

connect
205 Van Buren Street #420
Herndon, VA 20170
(703) 714-7345
Certifications

ISO 9001:2015, ISO 20000-1:2011 and ISO 27001:2013 registered.

Site by: img