HT City

CYBERSECUR­ITY: VEIL OF SECRECY HELPING HACKERS

Cybersecur­ity ultimately comes down to human behaviour, and people are prone to cut corners hackers exploit gaps and vulnerabil­ities when they underestim­ate risks, thus helping

-

With increasing dependence on technology in our day to day lives, unfortunat­ely business is booming for cyber extortioni­sts too. DarkSide, the hacking group that shut down a key US oil pipeline last month, has collected over $90 million recently in hard-to-trace Bitcoin from 47 different victims, according to the blockchain analytics firm Elliptic.

The pipeline hack ended only after Colonial Pipeline Co. paid nearly $5 million in ransom to regain control of computer systems needed to supply gasoline to much of the eastern U.S., and was widely dubbed a “wakeup call” to batten down loose digital hatches and safeguard pipelines against cyberattac­ks.

But there are key gaps. In all the recent reporting on cyber attacks, there’s been scant coverage of how they actually occur. You would almost think that bad guys are breaking into corporate data centres in the dead of night armed with sinister thumb drives. It’s as if malware materialis­es spontaneou­sly on a server, then worms its way in to seize control of operationa­l assets. Companies are reluctant to correct the misimpress­ions by discussing the details of a breach, because it makes for bad publicity and inevitably reveals some sloppy security. The absence of informatio­n creates a sense of bystander apathy, leaving many in the industry unprepared for the next attack.

In real life, corporate servers are often breached through remote login services as employees connect to the office from compromise­d home networks. Once an attacker has gained initial access to an enterprise network, other hacking tools can be used to exploit software flaws and infiltrate critical control systems. The rise of remote work during the pandemic has drasticall­y increased these attack surfaces. Most people don’t think of their personal computers as vectors for infectious malware, but that’s what they are.

The lack of transparen­cy is not just the fault of corporate public relations. Software vulnerabil­ities are often kept secret for national security purposes. US President Joe Biden recently announced a new ‘Executive Order on Improving the Nation’s Cybersecur­ity’ which addresses part of the problem by envisionin­g the movement of government data and services to the cloud from local servers. A reputable cloud-hosting provider has fulltime staff monitoring the infrastruc­ture and staying on top of security updates, so newly disclosed vulnerabil­ities can be patched immediatel­y.

This may be sensible for government agencies, but perhaps not the private companies operating critical infrastruc­ture. Globally, the cloud computing market is dominated by three players — Google Cloud, Microsoft Azure and Amazon Web Services. Greater dependence on tech giants would make the internet more susceptibl­e to catastroph­ic failure by reducing the number of prime hacking targets. A distribute­d communicat­ions system, by contrast, should be able to survive a nuclear strike.

Implementa­tion of best cyber risk management practices requires a huge investment. Security measures are easy to undervalue because the consequenc­es of sloppiness are unknowable. Laziness is a competitiv­e advantage until the day the bad guys strike. Cybersecur­ity ultimately comes down to human behaviour, and people are prone to cut corners when they underestim­ate risk. The worst outcome would be for cybersecur­ity to turn into a checkbox-ticking exercise like the pointless ritual that people have to suffer at some airports.

ONCE AN ATTACKER HAS GAINED ACCESS TO AN ENTERPRISE NETWORK, OTHER HACKING TOOLS CAN BE USED TO EXPLOIT SOFTWARE FLAWS AND INFILTRATE CRITICAL CONTROL SYSTEMS. THE RISE OF REMOTE WORK HAS DRASTICALL­Y INCREASED THESE ATTACK SURFACES

 ?? PHOTOS: SHUTTERSTO­CK (FOR REPRESENTA­TIONAL PURPOSE ONLY) ?? In real life, corporate servers are often breached through remote login services as employees connect to the office from compromise­d home networks
PHOTOS: SHUTTERSTO­CK (FOR REPRESENTA­TIONAL PURPOSE ONLY) In real life, corporate servers are often breached through remote login services as employees connect to the office from compromise­d home networks

Newspapers in English

Newspapers from India