{"id":28026,"date":"2016-08-03T12:58:07","date_gmt":"2016-08-03T02:58:07","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=28026"},"modified":"2016-10-17T13:18:51","modified_gmt":"2016-10-17T02:18:51","slug":"cyber-wrap-130","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-130\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/p>\n
President Obama released a new Presidential Policy Directive<\/a> (PPD) on US Cyber Incident Coordination last week. The document laid out who\u2019s in charge during \u2018significant cyber incidents\u2019 targeting the US, with significant incidents rated at three or above on the White House\u2019s severity scale<\/a>. Level three events are \u2018likely to result in a demonstrable impact to public health or safety, national security, economic security, foreign relations, civil liberties, or public confidence\u2019.<\/p>\n The PPD established<\/a> that the Justice Department, via the FBI and the National Cyber Investigative Joint Task Force, will take the lead in \u2018threat response\u2019 and investigations, Homeland Security will spearhead asset protections and the\u00a0Office of the Director of National Intelligence will direct supporting intelligence activities. The National Security Council-chaired interagency Cyber Response Group will lead policy and strategy responses, and a Unified Coordination Group will be created by relevant agencies to lead technical co-ordination. The new directive applies to the both the private and public sectors and is intended to help clarify who in the US bureaucratic maelstrom of cyber agencies is in charge when the rubber hits the road.<\/p>\n Following the high-profile<\/a> hacking of the Democratic National Committee\u2019s email servers\u2014allegedly by Russian actors<\/a>\u2014Moscow is now dealing with its own high-profile infiltration<\/a>. The Federal Security Service of the Russian Federation (FSB) has identified an advanced persistent threat that targeted over 20 organisations, including government and military bodies, critical infrastructure, scientific and defence companies. The FSB told the media<\/a> that the malware allowed the attackers remotely turn on cameras and microphones, take screenshots and log text input on the infected computers. The FSB is now working<\/a> to identify all the organisations affected and \u00a0likely trying to establish which information has gone missing. Beyond commenting<\/a> that the attacks were \u2018planned and made professionally\u2019, the Russian government hasn\u2019t attributed the intrusion to a specific country or organisation.<\/p>\n South Korea has pointed the finger<\/a> squarely at North Korea following a recent compromise of government email accounts. Sixty individuals from across government, including the ministries of Foreign Affairs, Defense and Unification, had their email accounts compromised in a phishing campaign\u2014which also targeted academics and several journalists. Experts are now trying to discern what, if any, information was stolen by the attackers.<\/p>\n Last week, Washington DC played host<\/a> to the 4th US\u2013Japan Bilateral Cyber Dialogue. It was led by State Department Coordinator for Cyber Issues Chris Painter and Koichi Mizushima, Japan\u2019s Ambassador for Cyber Policy and Deputy Director-General of the Foreign Policy Bureau. The dialogue reaffirmed that the countries shared interest and cooperation in areas including the cybersecurity of critical infrastructure, capacity-building, information-sharing, military-to-military cyber cooperation, cybercrime, and international security issues in cyberspace. Discussion topics likely included Japan\u2019s ongoing cyber security ramp-up<\/a> in the lead up to the Tokyo games, and both countries shared pursuit<\/a> in cementing cyber norms of behaviour. Following the US talks, Japan will host a cyber-policy dialogue with Australia this week in Tokyo. This is the second cyber-policy meeting between our two counties and we\u2019ll be sure to have more on the discussions in next week\u2019s cyber wrap.<\/p>\n And finally, Vietnam\u2019s two largest airports have fallen victim<\/a> to an embarrassing attack launched by hackers sympathetic to China\u2019s maritime claims in the South China Sea. Hackers were able to manipulate the flight information boards in Hanoi\u2019s Noi Bai and Ho Chi Minh\u2019s Tan Son Nhat airports, replacing flight details with distorted information regarding the contested area. Not content with just accessing the interface, the group then took over the airports\u2019 PA systems, which began loudly broadcasting similar messages. Hacking group 1937cn claimed responsibility for the attack, and the related theft of Vietnam Airline\u2019s database of frequent flier details. This is the latest iteration of maritime tensions in region spilling<\/a> over<\/a> into<\/a> cyber<\/a> space<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":" President Obama released a new Presidential Policy Directive (PPD) on US Cyber Incident Coordination last week. The document laid out who\u2019s in charge during \u2018significant cyber incidents\u2019 targeting the US, with significant incidents rated at …<\/p>\n","protected":false},"author":133,"featured_media":28027,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,95,728,163,471],"class_list":["post-28026","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-cyber-security","tag-hacking","tag-russia","tag-south-china-sea"],"acf":[],"yoast_head":"\n