New Straits Times

INDUSTRIAL­ISED CYBERCRIME

Preventive measures are needed at regulatory and technologi­cal levels across industries to enhance risk resilience, writes TAMAS GAIDOSCH

-

CYBERCRIME is now a mature industry operating on principles much like those of legitimate businesses in pursuit of profit. Combating the proliferat­ion of cybercrime means disrupting a business model that employs easy-to-use tools to generate high profits with low risk.

Long gone are the legendary lone-wolf hackers of the late 1980s, when showing off level 99 computer wizard skills was the main reason to get into other people’s computers.

The shift to profit making, starting in the 1990s, has gradually taken over the hacking scene to create today’s cybercrime industry, with all the attributes of normal businesses, including markets, exchanges, specialist operators, outsourcin­g service providers, integrated supply chains, and so on.

Several nation-states have used the same technology to develop highly effective cyber weaponry for intelligen­ce gathering, industrial espionage, and disrupting adversarie­s’ vulnerable infrastruc­ture.

Cybercrime has proliferat­ed even though the supply of highly skilled specialist­s has not kept pace with the increasing technical sophistica­tion needed to pull off profitable hacks with impunity. Advanced tooling and automation have filled the gap.

Hacking tools have evolved spectacula­rly over the past two decades. In the 1990s, so-called penetratio­n testing to find vulnerabil­ities in a computer system was all the rage in the profession.

Most tools available at that time were simple, often custom built, and using them required considerab­le knowledge in programmin­g, networking protocols, operating system internals, and various other deeply technical subjects. As a result, only a few profession­als could find exploitabl­e weaknesses and take advantage of them.

As tools got better and easier to use, less skilled but motivated young people — mockingly called “script kiddies” — started to use them with relative success. Today, to launch a phishing operation—that is, the fraudulent practice of sending email that appears to be from a reputable sender to trick people into revealing confidenti­al informatio­n — requires only a basic understand­ing of the concepts, willingnes­s, and some cash. Hacking has become easy to do.

Cyber risk is notoriousl­y difficult to quantify. Loss data are scarce and unreliable, in part because there is little incentive to report cyber losses, especially if the incident does not make headlines or there is no cyber insurance coverage. The rapidly evolving nature of the threats makes historical data less relevant in predicting future losses.

Scenario-based modelling, working out the costs of a welldefine­d incident affecting certain economies, produces estimates in the tens or hundreds of billions of dollars. Lloyd’s of London estimates losses of US$53.05 billion (RM217.50 billion) for a cloud service outage lasting 2.5 to 3.0 days affecting the advanced economies.

An IMF modelling exercise put the base-case average aggregated annual loss at US$97 billion, with the worst-case scenario in the range of US$250 billion.

Crime in the physical world — with the intent of making money — is generally motivated simply by profit potentiall­y much higher than for legal business, which criminals view as compensati­on for the high risk.

In the world of cybercrime, similar or even higher profits are pos- sible with much less risk: less chance of being caught and successful­ly prosecuted and almost no risk of being shot at. Phishing profitabil­ity is estimated in the high hundreds or even over a thousand percentage points.

We can only speculate on the profits made possible by intellectu­al property theft carried out by the most sophistica­ted cyber threat actors. The basics, however, are similar: effective tooling and an exceptiona­l risk/reward ratio make a compelling case and ultimately explain the sharp increase in and industrial­isation of cybercrime.

Cybercrime gives rise to systemic risk in several industries. While different industries are affected differentl­y, the most exposed is probably the financial sector. A relatively new threat is posed by destructio­n-motivated attackers.

When seeking to destabilis­e the financial system, they look at the most promising targets. Financial market infrastruc­ture is the most vulnerable because of its pivotal role in global financial markets.

Given the financial sector’s dependence on a relatively small set of technical systems, knock-on effects from defaults or delays due to successful attacks can be widespread, with potentiall­y systemic effects.

And given the inherent interconne­ction of financial sector participan­ts, a successful disruption to the payment, clearing, or settlement systems — or stealing confidenti­al informatio­n — would result in widespread spillovers and threaten financial stability.

The financial sector has been dependent on informatio­n technology (IT) for decades and has a history of maintainin­g strong IT control environmen­ts mandated by regulation. While the financial sector may be most at risk of cyberattac­k, such attacks also carry a higher risk for cyber criminals, in part because of greater attention from law enforcemen­t ( just like old-fashioned bank robberies).

The financial sector also does a better job of supporting law enforcemen­t — for example, by keeping extensive records that are valuable in forensic investigat­ions. Deeper budgets can often lead to effective cybersecur­ity solutions.

The situation is different in healthcare. Except in the wealthiest nations, the healthcare sector typically does not have the resources necessary for effective cyber defence.

Although also heavily regulated and under strict data protection rules, healthcare has not relied nearly as much on IT as the financial sector, and consequent­ly has not developed a similar culture of strict IT controls. This, too, makes the healthcare sector more susceptibl­e to cyber breaches.

What is most worrisome about this weakness is that, unlike in the financial sector, lives can be lost if, for example, attackers hit computeris­ed life-support systems.

Utilities, especially the power and communicat­ion grids, are often cited as the next sectors where large-scale cyberattac­ks can have severe consequenc­es. In this case, however, the main concern is disruption or infiltrati­on of systems by rival states, either directly or through proxy organisati­ons.

Internatio­nal cooperatio­n i n combating and prosecutin­g cybercrime lags well behind the global nature of the threat. The best way to tackle cybercrime is to attack its business model, which relies on the exceptiona­l risk/reward ratio associated with ineffectiv­e prosecutio­n. In this context, the business risk of cybercrime must be raised significan­tly, but this is possible only with better internatio­nal cooperatio­n.

...the business risk of cybercrime must be raised significan­tly, but this is possible only with better internatio­nal cooperatio­n.

The writer, a senior financial sector expert in the IMF’s Monetary and Capital Markets Department, is a cybersecur­ity profession­al with more than 20 years’ experience, including probing banking systems to find cyberweakn­esses

 ??  ??

Newspapers in English

Newspapers from Malaysia