The News Herald (Willoughby, OH)

Fighting back against cyber attacks

- Dustin Carmack is a research fellow in The Heritage Foundation’s Center for Technology Policy and former chief of staff for the director of national intelligen­ce. He wrote this for InsideSour­ces.com.

“There is no way that this winter is ever going to end as long as this groundhog keeps seeing his shadow. I do not see any other way out. He’s got to be stopped. And I have to stop him.”

Bill Murray’s “Groundhog Day” comes to mind as we witness the recurring spate of ransomware, cyberattac­ks, and cyber espionage that have targeted U.S. agencies and businesses in recent years.

From the ransomware attacks on the Colonial oil pipeline, which caused consumer panic and gas shortages along the East Coast, and on JBS, the world’s largest meat processor, the problem is only getting worse.

Americans now realize what many national security leaders have said for years: our digital borders can be easily penetrated and cause turmoil in our daily lives. We live in an everincrea­sing digitalize­d world that offers amazing future technologi­cal possibilit­ies for everyday Americans. However, this is sprinkled with the downside of cyber threats within our interconne­cted society. These threats are not only disruptive but can be very costly (as the $11 million ransom that JBS paid to its attackers shows), as well as cause significan­t loss of property or life.

So how do we stop this pesky “groundhog”? There is not an easy “cybersecur­ity in a box” solution.

Any persistent actor, especially a nation-state, can infiltrate a network if given enough time, skill, and resources. We need a multi-pronged approach to put us on a better defensive and offensive footing going forward.

To its credit, the Biden administra­tion has zeroed in on cyber vulnerabil­ities in recent months, including recent announceme­nts by the Department of Justice that they will elevate cyber prosecutor­ial and law enforcemen­t action, to a new “Ransomware and Digital Extortion Task Force” for heightened coordinati­on of cyber activity.

The FBI recently seized $2.3 million back from the reported $4.4 million that Colonial paid their hackers. The FBI also used a court-authorized order earlier this year to remove remaining web-shells from the Chinese-based Hafnium attacks on the Microsoft Exchange servers.

Various Cyberspace Solarium recommenda­tions have become law recently.

Implementi­ng these will be critical, along with the recent Executive Order by the administra­tion to clean up the government’s woefully inadequate cyber lawn.

Calls for “private-public sector cooperatio­n” or “informatio­n-sharing” are important, but insufficie­nt when it comes to systemical­ly protecting important critical infrastruc­ture. As former NSA & Cyber Command head, Admiral Mike Rogers, said earlier this year, “it’s not about collaborat­ion…it’s about integratio­n.”

There is talk of legislatio­n that would require companies to disclose hacks.

Doing so could help by not only enabling the government to potentiall­y assist with an active breach or ransom, but by mitigating the future spread of the threat. It would also make critical infrastruc­ture operators more aware of active threats.

A word of warning, though. Bloated regulation or cyber requiremen­ts that tether private sector entities into specific technologi­es could also dampen innovation while doing little or nothing to secure our infrastruc­ture.

Businesses and CEOs can no longer take for granted their organizati­onal digital supply chains and cyber defenses. Paying ransoms and hoping that cyber insurance will eventually make you whole is not a longterm strategy and imperfect at best.

Although ransomware has dominated headlines most recently, increasing­ly sophistica­ted spear-phishing campaigns and general breaches of user authentica­tion processes are the standard offenses for many cybercrimi­nals and nation-states actors.

Increased focus on software supply chain security, zerotrust architectu­re, and multifacto­r authentica­tion need to become a mainstay of those operating in a cyber world, no matter how small the business or operation.

Critical infrastruc­ture operators and businesses have to ask themselves if they’ll be ready if that “Winter is Coming” moment comes to their system.

Did they properly back up their data and store it offline?

Are their informatio­n technology systems bleeding over to their infrastruc­ture’s operationa­l technology?

What systems will they have in place to communicat­e and get back online?

Just as war games and military planning are a necessary function of our military apparatus to be prepared for contingenc­ies, companies must prepare similarly for these looming cyber storms.

Nothing about cybersecur­ity can be foolproof or unbreachab­le. But the U.S. can come to terms with some of these questions and come up with solutions to avoid Phil Connor’s prediction of a winter that is “going to last you for the rest of your lives!”

Paying ransoms and hoping that cyber insurance will eventually make you whole is not a long-term strategy and imperfect at best.

 ??  ?? Dustin Carmack
Dustin Carmack

Newspapers in English

Newspapers from United States