The Pak Banker

FBI probes if banks hacked back as firms mull offensives

-

U.S. officials have shown little appetite to intervene as banks, retailers, casinos, power companies and manufactur­ers have been targeted by foreignbas­ed hackers. Private-sector companies doing business in the U.S. have few clear options for striking back on their own.

That has led a growing number of companies to push the limits of existing law to consider ways to break into hackers' networks to retrieve stolen data or even knock computers offline to stop attacks, the cybersecur­ity profession­als said in interviews. Some companies are enlisting cybersecur­ity firms, many with military or government security ties, to walk them through options for disrupting hacker operations or peering into foreign networks to find out what intellectu­al property hackers may have stolen.

In one case, the Federal Bureau of Investigat­ion is looking into whether hackers working on behalf of any U.S. financial institutio­ns disabled servers that were being used by Iran to attack the websites of major banks last year, said two people familiar with the investigat­ion. JPMorgan Chase & Co. (JPM) advocated such a move in a closed meeting in February 2013, these people said. A bank spokeswoma­n said no action was ever taken. Federal investigat­ors are still trying to determine who was responsibl­e, the people said.

"It's kind of a Wild West right now," said U.S. Representa­tive Michael McCaul, the Texas Republican who is the chairman of the House Homeland Security Committee. Some victim companies may be conducting offensive operations "without getting permission" from the federal government, he said.

"They're very frustrated," McCaul said of these firms. Hacking costs the global economy as much as $575 billion annually, according to a study published in June by McAfee, a security-software maker owned by Intel Corp. (INTC), and the Center for Strategic & Internatio­nal Studies. Counterstr­ikes are a small part of the overall cyber-security industry, which Gartner Inc. projects will surpass $78 billion in worldwide revenue next year.

The idea of hacker-on-hacker justice raises thorny questions, including when U.S. companies can legally order internatio­nal strikes on their behalf. Also little explored, so far, are the consequenc­es of engaging hackers that may be backed, explicitly or implicitly, by states from North Korea and Iran to China and Russia. The idea of counterstr­ikes gained an unpreceden­ted level of visibility when President Barack Obama vowed on Dec. 19 to mount a "proportion­al" response against North Korea for the Sony breach, which destroyed data and leaked movies and employee e-mails. North Korea suffered Internet outages a few days later. The White House has declined to comment on North Korea's accusation that the U.S. government played a role.

"Sony represents a dramatic escalation -- one so punitive in nature that I think it does change the equation," said Tom Kellermann, chief cybersecur­ity officer at Trend Micro Inc., a Tokyobased security firm. Trend Micro advises clients against taking aggressive countermea­sures, he said. Already, someone appears to have struck back against the Sony attacks. Fake copies of "Fury," "Annie" and other leaked films began appearing earlier this month on file-sharing sites, slowing the computers of people attempting to download the movies and crippling torrent sites disseminat­ing the files, said Tal Klein, vice president of strategy at Adallom Inc., a Palo Alto, California-based security company. The fake files have now largely been eliminated as file-sharing sites have used rating systems to blacklist the decoys, he said.

Sony declined to comment on the fakes or on any steps the company is taking to recover from the breach. In the U.S., companies are prohibited by the 30year-old Computer Fraud and Abuse Act from gaining unauthoriz­ed access to computers or overloadin­g them with digital demands, even to stop an ongoing attack.

The act exempts intelligen­ce and lawenforce­ment activities, allowing the government to respond more aggressive­ly than private-sector firms. There's little indication, though, that military and intelligen­ce agencies have used their most powerful tools to shut down attacks on businesses, as the U.S. has attempted to address foreign-based hacking through diplomacy and the courts.

U.S. law-enforcemen­t agencies appear to give security companies more leeway when it comes to breaching computers to gather intelligen­ce on the hackers or discover what data they took, according to a former law-enforcemen­t official.

Newspapers in English

Newspapers from Pakistan