Manawatu Standard

Cyberattac­ks expose lax security: experts

-

New Zealand is too small and interconne­cted for people to speak too negatively about the country’s institutio­ns, which is why it’s hard to get anybody to say anything bad about the NZX or Reserve Bank cyberattac­ks last year.

At some point you’re probably going to have to deal with the person or institutio­n you slag off in public. Worse, you might even need to tender for a contract from them.

This attitude is the glue that stops us from descending into a pit of angry recriminat­ions in our public sphere, but it’s also how Reserve Bank chairman Neil Quigley was able to stand up in front of an audience at an event in Auckland this year, and heap a lot of blame for the Reserve Bank hack on to a foreign IT vendor. ‘‘We had no warning to avoid the attackwhic­h began in late December.

‘‘[The vendor] failed to notify us for five days that an attackwas occurring against its customers and a patch was available.’’

A reluctance to criticise is also how the NZX got away with only releasing a press release about a report into its cybersecur­ity issues and not the report itself.

The NZX still has not even released a redacted version of this report to the public. For what it’s worth, the NZX claims the Inphysec report proves the organisati­on came under an unpreceden­ted attack which could not have been reasonably predicted by its staff or board.

Mega executives co-founder Bram van der Kolk and chief technology officermat­hias Ortmann have no such qualms about offending people.

When Kim Dotcom was at the helm the file sharing and hosting service seemed to almost embrace controvers­y. First, with Dotcom’s verbal sparring with John Key’s Government and then with his launch of the Internet Party. On top of this, both van der Kolk and Ortmann’s passports are still being held by the courts as extraditio­n proceeding­s drag on against them.

Which is probably why Ortmann seems to have no issue criticisin­g the Reserve Bank’s approach of blaming the vendor for not letting it know a patch was available.

‘‘That is a very, very unrealisti­c expectatio­n,’’ he said. ‘‘If you wait until the vendor tells you, and you do not actively monitor for vulnerabil­ities, the vulnerabil­ity might actually be published [to other hackers] before the vendor finds out about it – which is an everyday occurrence.’’

Keeping vulnerable pieces of software off computers connected to the internet is a basic design feature that you don’t need to be a particular­ly sophistica­ted computer genius to understand. Especially if the piece of software is so old that it’s not properly supported by the vendor, as appeared to be the case here.

‘‘Anything you run on the open internet you must be very vigilant about it,’’ van der Kolk says.

Then Ortmann jumps in: ‘‘The first question to ask is: does this service need to be running on the open internet or not?’’

Ortmann raises some interestin­g questions. The piece of software Quigley and the Reserve Bank spoke about was a piece of ‘‘legacy’’ software not properly supported by the vendor. If you had to use such a thing was it necessary to keep it exposed to every hacker on the internet?

Employees could have accessed this tool using a virtual private network (VPN) instead, he suggests. This would allow people to access the tool, but remove it from the company’s network and the internet at the same time. It would also block it off any future unknown vulnerabil­ity from being exploited.

A Reserve Bank spokespers­on says the bankwill comment further on the incident ‘‘as and when it is appropriat­e to do so’’. It does not want to undermine a review by KPMG or criminal and forensic investigat­ions.

However, the advice to remove legacy systems from exposure to the open internet is so basic it’s even parroted by the Government’s own cybersecur­ity organisati­on CERT NZ: ‘‘By definition, legacy systems are vulnerable, and present a risk to your organisati­on. The safest option is to stop using them and remove them from your network,’’ CERT’S website says.

Mega is no stranger to cyberattac­ks and security issues. It almost invited them with promises of complete anonymity and encryption.

Van der Kolk says the attacks could have been easily combatted by ramping up bandwidth so the system wouldn’t be overwhelme­d by cyberattac­kers. The NZX could have purchased plenty of services to do this. As he talks about this Ortmann scouts Google and finds out other stockmarke­ts, like the Nasdaq, have used these kinds of services for years.

Their point is, if NZX was not paying for basic safety precaution­s, or did not know it needed them, what hope is there for other smaller organisati­ons?

Van der Kolk and Ortmann aren’t alone in thinking our companies and the boards that govern them aren’t taking cybersecur­ity seriously enough.

Cybersecur­ity experts like deriskme.com’s Paula Gair say it is hard to elevate these cybersecur­ity issues to the boardroom level. Health and safety issues are discussed all the time, but cybersecur­ity ones not so much.

She suggests it might stay that way until boards and their directors are made personally liable for serious cybersecur­ity breaches in the sameway they are for health and safety ones.

‘‘Unfortunat­ely until something goes wrong it’s really difficult to get it high enough up the list. If you think about how we deal with health and safety and the fact thatwe’ve actually made directors liable for serious health and safety breaches then that gets that right up to the top table.’’

Institute of Directors chief executive Kirsten Patterson argues directors are already liable. ‘‘There’s been some pretty clear direction from some of our regulatory authoritie­s like the Reserve Bank and thefma [Financial Markets Authority] who have made it really clear that boards need to take responsibi­lity for overseeing cybersecur­ity.’’

She says boards are taking these issues very seriously, but acknowledg­es the institute’s own director sentiment survey shows a huge chunk of companies don’t regularly discuss cybersecur­ity issues at all.

In Australia, the Australian Securities and Investment­s

Mega co-founder

Commission (Asic) took legal action against a company for not taking enough cybersecur­ity precaution­s to prevent a brute force cyberattac­k.

Last year Asic started federal court proceeding­s alleging the RI Advice Group failed to implement ‘‘adequate policies, systems and resources which were reasonably appropriat­e to manage risk in respect of cybersecur­ity and cyber resilience’’.

Patterson thinks we aren’t far off from seeing similar action taken here.

‘‘I think all directors are upskilling and upskilling really fast. We’re all responsibl­e. Same way that everyone’s responsibl­e for finance, we’re all responsibl­e for health and safety, and we’re all responsibl­e for cyber.’’

Van der Kolk and Ortmann say New Zealand is more of a target for cyberattac­ks these days than we think. Our relative isolation used to mean we were off the radar for many, but now it makes us a target. We’re a developed country with many systems open to the internet, but without enough experience­d personnel here to advise companies on what they should do.

Which is Ortmann’s theory around how the NZX ended up being targeted in a cyberattac­k. In a statement an NZX spokesman sayswellin­gton-based cyber experts Inphysec concluded the attacks on the NZX went ‘‘well beyond anything previously seen that could have been reasonably forecast’’.

Then it quotes Inphysec’s unreleased report which it claims says: ‘‘The volume, sophistica­tion and persistenc­e of the attacks were unpreceden­ted in anew Zealand context, and are amongst the most severe we are aware of to have been experience­d internatio­nally’’.

Ortmann says a lot of other stockmarke­ts in the developed world had taken precaution­s; NZX was likely targeted because it hadn’t. In other words, the attack was unpreceden­ted because ‘‘script kiddies’’ knew if they’d tried it on the same scale elsewhere they wouldn’t have been successful.

Government solutions to the problem seem to be having varied levels of success. The Government Communicat­ions and Security Bureau says its Cortex system, which protects critical infrastruc­ture from cyberattac­k, prevented $100 million worth of cyber-disruption since 2016.

A Government request for proposal (RFP) for a cyber credential scheme targeted at smaller businesses was awarded to EY and Capella Consulting in January, 2018, but the most prominence it ever gained was after Capella complained the Government was doing little to promote its use.

A spokespers­on for the Department of Prime Minister and Cabinet said ‘‘following the conclusion of government involvemen­t in the [cyber credential] scheme, the primary channel for cyber security advice and support to small business is via CERT NZ’’.

Ortmann suggests companies and individual­s are capable of solving this problem without Government help.

Small tomedium-sized enterprise­s could sort themselves out independen­tly of the Government by banding together in groups of 10 or so and sharing resources.

Van der Kolk says it also might just be about everyone sticking to some basic principles. ‘‘Just like you have a lock on your door, you wouldn’t share the key with other people, you would have different keys for different things.

‘‘If you just apply some very basic principles it’s not very hard to be more resilient.’’

‘‘If you just apply some very basic principles it’s not very hard to be more resilient.’’

Bram van der Kolk

 ?? RICKY WILSON/STUFF ?? Mega executives Bram van der Kolk and Mathias Ortmann’s passports are still being held at the High Court as part of the Kim Dotcom saga.
RICKY WILSON/STUFF Mega executives Bram van der Kolk and Mathias Ortmann’s passports are still being held at the High Court as part of the Kim Dotcom saga.

Newspapers in English

Newspapers from New Zealand