{"id":32430,"date":"2017-06-14T13:06:13","date_gmt":"2017-06-14T03:06:13","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=32430"},"modified":"2017-06-14T13:09:04","modified_gmt":"2017-06-14T03:09:04","slug":"cyber-wrap-168","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-168\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/p>\n
Prime Minister Turnbull issued his national security statement<\/a> in Parliament yesterday, again calling on cooperation on decryption from social media and messaging platforms when countering violent extremists. The topic is set to be the key focus of an upcoming Five Eyes meeting in Canada this month, and Attorney-General George Brandis has announced that the government intends to improve warrant-based powers<\/a> to compel technology companies to decrypt communications, mirroring steps taken in the UK to introduce formal \u2018technical capability notices\u2019<\/a>. The government has pushed the message<\/a> that these are reasonable adjustments to the current framework of warranted collection, but the move has re-ignited privacy debates regarding \u2018backdoors\u2019<\/a> dating back to the infamous Apple vs. the FBI case<\/a>.<\/p>\n Australia has continued to sign cyber diplomacy agreements in the Asia\u2013Pacific region<\/a>, with Australia and Thailand\u2019s national-level policing forces agreeing to cooperate in building digital forensics and digital technology capability<\/a>.<\/p>\n The government\u2019s Digital Transformation Agency<\/a> (DTA) has seen 35 of its employees quit<\/a> as a result of changes to the agency late last year. Most of the departing staff are developers, designers and architects. The high-profile departure of Office head Paul Shetler<\/a> and internal frustrations over stalled government IT integration projects<\/a> are thought to be contributing factors. For an agency that has just over a hundred workers<\/a>, of whom 71 are \u00a0Public Service members, the loss of in-house technical subject matter expertise could jeopardise ambitious plans unveiled in this year\u2019s Federal Budget<\/a> to make the DTA an authoritative office for all things digital, including cyber security.<\/p>\n At the Emerging Cyber Threats Summit in Sydney there were renewed calls to expand the remit of the Australian Signals Directorate (ASD) to provide cybersecurity advice from \u2018basement to boardroom<\/a>\u2019. The Victorian audit office has expanded its cyber security back office audit and assurance role, announcing it will undertake<\/a> an ambitious series of eight audits<\/a> across central government agencies in Victoria, to improve public confidence in the security and privacy protections of state government IT systems. As well, former Atlassian exec and Australian Cyber Security Growth Network CEO Craig Davies has argued that customers need to demonstrate more confidence in Australian cyber security businesses, lambasting the current market for forcing Australian firms overseas<\/a> before they\u2019re seen as \u2018good enough\u2019 to buy from domestically, thus stunting the growth of Australian cyber security innovation and collaboration.<\/p>\n Two sets of research into the cyber attack-induced blackouts<\/a> in Ukraine last December have found that, once again, hackers with ties to Russia are to blame. More ominously, the tooling used in that attack, Industroyer by ESET<\/a> and CrashOverride by Dragos<\/a>, demonstrates a growing maturity compared to tools used in a 2015 attack on Ukraine\u2019s electricity grid. The new malware is being described as a modular and holistic \u2018swiss-army knife\u2019 that has automated the attack process end-to-end, including infection, propagation and clean-up. Moreover, the malware can disable or cause physical damage<\/a> to any electric grid that uses similar industrial control software, making the threat of a \u2018cyber storm\u2019<\/a> on critical infrastructure more likely.<\/p>\n On the other side of the offense spectrum, a report has found that decision makers have been largely disappointed by the limited effect of US offensive cyber measures against Islamic State\u2019s online recruitment networks. The terrorist organisation has demonstrated significant resilience and adaptation against cyber weapons, leaving their \u2018global reach largely intact<\/a>\u2019. Similar limitations were found in the use of Stuxnet against Iran\u2019s uranium enrichment centrifuges<\/a>, which, despite successive iterations and upgrades to the Stuxnet virus, saw Iran\u2019s nuclear program continue to reach new milestones. North Korea\u2019s missile and nuclear weapons program<\/a> have reportedly demonstrated similar resilience<\/a> against cyber offensives, suggesting that while cyber weapons can delay weapons development programs and generate opportunities for policy solutions, they only produce temporary setbacks and must be part of a broader set of tools.<\/p>\n The UK\u2019s general election has wrapped up, resulting in a surprise hung parliament and probably a coalition government between the Conservative party and the Democratic Unionist Party. The good news is that, so far, there\u2019s been little to suggest<\/a> that cyberattacks affected the integrity of the election, despite earlier concerns<\/a>, offering a welcome respite from the hacks that punctuated the French and US Presidential elections.<\/p>\n For fans of the duct-tape approach to webcam security<\/a>, which include members as distinguished as Mark Zuckerberg<\/a> and James Comey<\/a>, new research suggests<\/a> that anything with an indicator light on it might need the same treatment. Researchers have developed methods for exfiltrating data using the rapid blinking of indicator LEDs<\/a> on network routers. Try your binary skills at deciphering the message in this demonstration<\/a> (video). The technique builds on previous exfiltration methods<\/a> using drones and disk drive LEDs. Let this serve as a reminder that any device that signals can be co-opted to become a monitoring device!<\/p>\n Researchers have found<\/a> that Britney Spears\u2019 Instagram profile has been used by Turla, a cyber-espionage group linked to Russian intelligence agencies<\/a>, to communicate with a backdoor trojan<\/a>. While early analysis seems to indicate this was only a test run, it highlights a wider concern<\/a> that almost any communications channel can be used to control and command malware.<\/p>\n","protected":false},"excerpt":{"rendered":" Prime Minister Turnbull issued his national security statement in Parliament yesterday, again calling on cooperation on decryption from social media and messaging platforms when countering violent extremists. The topic is set to be the key …<\/p>\n","protected":false},"author":608,"featured_media":32431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[143,391,728,163],"class_list":["post-32430","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-asia-pacific","tag-cyber","tag-hacking","tag-russia"],"acf":[],"yoast_head":"\n