National Post

Seek the cloud to avoid a cyberattac­k

Malware hack heightens global awareness

- ELAINE OU Elaine Ou is a blockchain engineer at Global Financial Access, a financial technology company in San Francisco. Previously she was a lecturer in the electrical and informatio­n engineerin­g department at the University of Sydney. Bloomberg View

Ma l ware has yet again disrupted businesses around the world, just weeks after hackers used leaked National Security Administra­tion tools in a global cyberattac­k called WannaCry.

The ultimate target in both cases may be people’s sensitive informatio­n — a troubling reality that should finally motivate organizati­ons to get serious about security.

Tuesday’s attack, which continued to spread around the world Wednesday, was more sophistica­ted than WannaCry, which took advantage of a Windows exploit to infect more than 200,000 computers in 150 countries ( and which cost, by one estimate, more than US$4 billion).

Microsoft security researcher­s have traced the initial infection to a Ukrainian software vendor called M. E. Doc, which inadverten­tly released a malevolent update to its popular tax accounting software. When customers installed the automatic update, a piece of malware obtained passwords that were then used to gain access to other machines. The so-called Petya virus then locked users out of their com- puters and demanded $ 300 in bitcoin to get back in.

The attack was hardly lucrative for its instigator­s. Although it affected thousands of corporate networks, the ransom address accumulate­d a grand total of only $ 9,159. Even the WannaCry ransom amounts to only $ 130,000 in bitcoin to date. The NSA has reportedly linked the WannaCry cyberattac­k to North Korea. I suppose $ 130,000 goes a lot further in North Korea than it does here, but that’s still barely enough for a stick of plutonium.

Given the overhead costs of packaging and distributi­on, cyber extortion is rarely a profitable venture. On the other hand, a locked- up computer system presents the perfect cover for attackers to steal sensitive data.

The WannaCry attack targeted National Health Service hospitals in England and Scotland, perhaps because health- care records contain irrevocabl­e informatio­n that can be used f or i dentity theft. Given that this week’s ransomware propagated though a tax accounting package favoured by Ukrainian businesses, the most likely victims were financial account controller­s doing business i n Ukraine. Notable victims include legal firm DLA Piper and shipping and transport firm A. P. MollerMaer­sk.

It ’s worth noting that cloud computing services like Google and Amazon, which control vast amounts of data around the world, have yet to be crippled by a ransomware attack or even suffer a known data breach. Google in particular prevents break- i ns across a global workforce by implementi­ng a strict provisioni­ng system, in which every device is presumed to be untrustwor­thy.

Access management is an old- fashioned idea that doesn’t get enough attention in our hyper- connected world.

In earlier generation­s, sensitive informatio­n was stored in locked filing cabinets located in separate offices. We’ve since digitized the data without replicatin­g the access management. When organizati­ons migrated from applicatio­n- specific mainframes to networked personal computers ( primarily to cut costs), they turned every single computer into a potential entry point for hackers.

It’s like giving every employee a master key to the building.

Cloud computing has a lot of similariti­es to mainframe infrastruc­ture. Users access enterprise software through their Internet browsers, much as they used to access the mainframe through dumb terminals. Because individual users aren’t in charge of maintainin­g critical software on their personal machines, it’s much more difficult for malware to get in. This makes the whole enterprise less vulnerable to breaches.

Stories of crippling rans omware dominate t he news, but ensuing data breaches tend not to surface for years. Such breaches primarily affect end users in ways that may be difficult to trace, so organizati­ons haven’t been terribly motivated to overhaul their security and dump the universall­y connected computing paradigm. Perhaps the latest disasters will put more pressure on the industry to get its act together.

 ?? VADIM GHIRDA / THE ASSOCIATED PRESS ?? Razvan Muresan, a Bitdefende­r public relations specialist in Bucharest, Romania, is backdroppe­d by a screenshot of the ransom message displayed on computers affected by the latest cyberattac­k this week.
VADIM GHIRDA / THE ASSOCIATED PRESS Razvan Muresan, a Bitdefende­r public relations specialist in Bucharest, Romania, is backdroppe­d by a screenshot of the ransom message displayed on computers affected by the latest cyberattac­k this week.

Newspapers in English

Newspapers from Canada