San Francisco Chronicle

Thwarting cyberattac­ks requires hacker’s mind-set

- By Gregory Falco Gregory Falco is a security researcher at the Massachuse­tts Institute of Technology’s Computer Science and Artificial Intelligen­ce Laboratory. He is working to develop the new field of Defensive Social Engineerin­g at MIT’s Department of

Our cities are under attack. In the past two months, two major cyberattac­ks have targeted urban critical infrastruc­ture and services. In February, Colorado’s Department of Transporta­tion had to shut down 2,000 employee workstatio­ns after an attack. The department website reported issues for more than a week after the attack. In late March, 8,000 city employees in Atlanta resorted to using pen and paper for work after a cyberattac­k compromise­d their computers. Both attacks caused havoc.

Public agencies are perfect targets for hackers. Why? Hackers are known for taking the path of least resistance when staging a major attack. Some companies spend millions of dollars a year on security technologi­es and on hiring difficult-to-find talent in cybersecur­ity to help defend their networks. Our public systems do not have the financial means to procure such security software or talent. Thus, public agencies become the low-hanging fruit for hackers to target and disrupt. That’s why the Defensive Social Engineerin­g Team at the Massachuse­tts Institute of Technology is working on developing a toolbox of nontechnic­al defenses against cyberattac­ks for cities.

The most prevalent form of attack against public agencies is social engineerin­g. This involves tricking a civil servant into clicking on a link or email attachment that installs malware. Because public agencies do not have the budget to invest in expensive technical security solutions, they should look to the hackers for inspiratio­n and complement technical tools with less expensive social defense tools. My team suggests using defenses called Defensive Social Engineerin­g.

Here’s what happens in a cyberattac­k.

Ransomware is the malware of choice for hackers against public agencies. Many public agencies post email addresses of department personnel online so the public can contact them. It is not difficult for attackers to quickly collect addresses and disseminat­e emails containing the malicious software that, when activated, encrypts all the files in the computer and demands a ransom. Until the ransom is paid, the infected system is unusable.

When the Police Department in Swansea, Mass., was hit in 2013 with a ransomware attack, the city decided to pay the $750 ransom so that it would not lose valuable records.

When the Cockrell Hill Police Department in Texas was hit in 2016 with a ransomware attack, the department refused to pay the ransom — and lost eight years’ worth of police evidence that was important for pending court cases.

How do we protect our public agencies from these attacks?

Some organizati­ons focus any and all funding they have on developing a strong backup program. This way, if hackers try to blackmail a city, services can be restored without having to pay the ransom. While backups are essential in these scenarios, it still takes time to reboot all the systems. For example, in 2016, the San Francisco Municipal Transporta­tion Agency was ransomware­d, where the hackers demanded 100 bitcoin or about $70,000 at the time. Because of the attack, the agency took the precaution­ary measure of shutting down all fare payment systems. In doing so, passengers were allowed to use the SFMTA system for free during the downtime, which cost the SFMTA $50,000 in lost fares. The systems were shut down when the ransomware was detected, and three days later, the backups were installed. This was a terrific case of cyberresil­ience by a public agency, however, it clearly takes time for backups to be deployed.

In addition to using backups as technical defenses, one cyberdefen­se is conducting a misinforma­tion campaign. For example, if a hacker steals your passwords, your organizati­on should issue a press release indicating that the hackers actually stole a decoy data set. This action can devalue the stolen data set. Further, your organizati­on can leak fake passwords that can further confuse hackers about which passwords are valid. These actions will make the stolen informatio­n considerab­ly less valuable because buyers of the informatio­n on the Dark Web will not know which passwords are authentic.

Another defensive social engineerin­g tool is proactive defensive signaling. A public agency can use this by announcing its policy for dealing with hackers and specific repercussi­ons for potential attacks. For example, a public organizati­on can proactivel­y announce it will not pay ransoms. This could potentiall­y deter a hacker, leaving agencies that do not have a clear payment policy for ransoms as a more inviting target.

Many once thought the only social strategy to defend against cyberattac­ks was to develop an employee cybersecur­ity awareness campaign that could help reduce the effectiven­ess of social engineerin­g attacks. These are useful, but public agencies need to start taking a page out of the hacker playbook and seek less expensive and high impact strategies to defend their computer networks and systems.

 ?? John Spink / Atlanta Journal-Constituti­on ?? A city employee helps a citizen in Atlanta, which was the victim last month of a ransomware attack that forced public workers to revert to pencils and paper.
John Spink / Atlanta Journal-Constituti­on A city employee helps a citizen in Atlanta, which was the victim last month of a ransomware attack that forced public workers to revert to pencils and paper.

Newspapers in English

Newspapers from United States