Whanganui Chronicle

Hacks slacken in number — but not in the impact on their targets

- Juha Saarinen comment

The numbers from the Government’s Computer Emergency Response Team (CERT NZ) for the October to December quarter last year are out of their inexplicab­le embargo, and there’s a surprise.

The CERT NZ stats from last year point to a decrease in incidents reported to them compared to the third quarter of 2020.

Between July and September 2020, 2610 incidents were reported to CERT NZ, which dealt with the vast majority of them, referring 14 per cent to seven other government agencies like the NZ Police and the Department of Internal Affairs.

The final quarter, however, saw only 2097 CERT NZ reports, and with the fourthlowe­st direct financial losses since the first quarter of 2018.

Provided the numbers are correct, then that’s good news. But it’s not a reason for New Zealand to drop its guard and relax.

If anything, last year hackers ratcheted up the severity of digital threats by several notches, and are now being more discrimina­ting about who they attack.

This becomes clear when you read the analysis by Google’s elite Project Zero security researcher­s, who in 2020 found an unknown threat actor conducting targeted attacks on Microsoft Windows, Google Android and Apple iOS devices.

Said attacker used what Project Zero called expert and novel techniques, and that is high praise indeed, coming from some of the best security researcher­s in the world.

One striking feature of the campaign that Project Zero analysed is that the attacker burnt through no fewer than 11 zero-day vulnerabil­ities.

A “zero-day” is geek speak for a vulnerabil­ity that hasn’t been seen or reported before, and is completely new. The zero refers to the amount of time that defenders have to react and fix things before the attacks start.

It’s not necessary in most cases to use zero-days for attacks, as organisati­ons have been slack at patching and setting up systems correctly.

Instead, zero-days are fairly rare, and for those select occasions when the value of the targets makes it worthwhile to use them. Once a zero-day is used, security researcher­s who notice the attacks and analyse them can figure out what weaknesses they are exploiting, and develop mitigation­s and software patches.

That makes a valuable attack method for which there wasn’t a defence null and void, yet here’s someone or some group that happily used up 11 of them in just a few months.

It means that there’s a threat actor somewhere who most likely knows more zero-days that can be used at any time. No wonder then that the security research industry collective­ly did a sharp intake of breath when that realisatio­n sank in.

Other signs that the threat landscape is getting worse are the recent ransomware attacks on large Taiwanese computer maker Acer and Asian retail chain Dairy Farm.

The ransomware criminals are asking US$50 million ($69.6m) and US$30m from the two organisati­ons respective­ly, which is a massive hike compared to extortion demands seen in the past.

That’s bold, but a new twist to the ransomware saga is how companies with “cyber insurance” to protect them against the consequenc­es of attacks (well, to a degree at least) have moved up the target list to the top spot.

It’s similar to people putting surveillan­ce cameras and video doorbells on their houses, which don’t deter burglars but tell them there’s valuable stuff inside.

Ransomware raiders have figured out that if they hack insurance companies, they’ll get lists of valuable targets to attack who are likely to pay up because . . . their insurance will cover it.

They also know that some organisati­ons have taken out insurance instead of doing the hard yakka of being constantly vigilant against security threats and are easy pickings.

One positive developmen­t is that government security agencies have become more responsive, using newly-assigned powers to force private and public organisati­ons to actually fix their vulnerable systems.

This is so in the United States especially, where the Cybersecur­ity and Infrastruc­ture Agency (CISA) literally ordered organisati­ons to unplug and patch vulnerable on-premise Microsoft Exchange Server installati­ons, which are under heavy attack after an exploit chain leaked.

The campaign to patch the Exchange boxes is working, and the number of vulnerable servers is reducing by the day.

Not fast enough, and those who are slow to patch will regret it as hackers rush to exploit remaining vulnerable systems.

That’s the kind of active, fast response capability New Zealand could do with, as any drop in cyber incident numbers is most probably the lull before the storm.

 ?? Photo / 123RF ?? A mysterious attacker has mounted a sophistica­ted campaign against Windows, Android and Apple iOS devices.
Photo / 123RF A mysterious attacker has mounted a sophistica­ted campaign against Windows, Android and Apple iOS devices.
 ??  ??

Newspapers in English

Newspapers from New Zealand