{"id":32602,"date":"2017-06-28T12:30:24","date_gmt":"2017-06-28T02:30:24","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=32602"},"modified":"2017-06-27T22:43:06","modified_gmt":"2017-06-27T12:43:06","slug":"cyber-wrap-170","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Image<\/p>\n

The UK Parliament\u2019s e-mail system was targeted by a sustained brute-force password-guessing attack last Friday<\/a>, forcing parliamentary staff to temporarily block remote email access and mandate password changes. The \u2018rudimentary<\/a>\u2019 but effective attack resulted in the compromise of at least 90 email accounts<\/a>. A few members of parliament, including Cabinet ministers, saw their details posted for sale<\/a> online, and it\u2019s possible that embarrassing personal information has been taken, posing a risk of blackmail<\/a>. More importantly, the details gathered could be used to penetrate other vital systems<\/a>. It\u2019s not yet clear who conducted the attack or why they did it, but Conservative Party MP Henry Smith<\/a> trundled out the usual suspects, from Russia, to North Korea, to an anonymous stranger in a basement. Subsequent commentary has criticised the Parliament\u2019s information security practice<\/a>s, from accepting the use of weak passwords<\/a> that could be \u2018guessed\u2019, to lacking basic and decades-old mitigation<\/a> strategies like IP filtering and 2-factor-authentication, and finally the 10-hour delay before<\/a> the Parliamentary Digital Service alerted affected personnel.<\/p>\n

Attorney-General George Brandis and Minister for Immigration and Border Protection Peter Dutton have issued a joint media release<\/a> setting out Australia\u2019s agenda ahead of a Five-Eyes meeting in Ottawa<\/a>\u2014though 10 points from Gryffindor for \u2018Ottowah\u2019. The meeting is set to focus on encrypted communications, data sharing and immigration arrangements. Encrypted messaging has dominated the national security debate recently, due to its massive growth to 40% of CT-related commutation intercepts<\/a> today, compared to 3% just four years ago. Russia is also facing the encryption debate, with the Russian Federal Security Service threatening to block encrypted messaging app Telegram<\/a> for refusing to decrypt messages after it was used by terrorists in the St. Petersburg metro attack back in April.<\/p>\n

Tech firms aren\u2019t happy with the direction of the encryption debate either, with Google\u2019s Legal Counsel Kent Walker stating that companies are in an \u2018untenable\u2019 position<\/a>\u2014caught between needing to fulfil unwieldy treaty-based international evidence requests (which currently take up to 10 months on average) despite systemic legal ambiguity. In a supporting blog post<\/a>, he\u2019s called for new regulations that clarify data sovereignty<\/a>, improve current international evidence sharing processes, and introduce agreed norms when it comes to baseline principles of privacy, human rights and due process. Google has also announced that Gmail<\/a> will no longer be scanned for advertising profiling data to increase consumer confidence.<\/p>\n

In news for any legal scholars following the infosec world, the National Law Review, an American journal, has put out a three-part series<\/a> providing a rundown on China\u2019s recently implemented Cybersecurity Law. Germany has recently introduced new laws<\/a> that expand the scope of situations<\/a> in which German police are allowed to access devices and see messages at the source<\/a>. The law has run into legal challenges<\/a>, which argues that the new legislation is in contravention of EU laws. Finally, pending legislation<\/a>, Canada might see it\u2019s Communications Security Establishment legally empowered<\/a> (with upgraded oversight<\/a>) to carry out<\/a> offensive cyber operations, a move that would significantly expand its mandate<\/a>.<\/p>\n

Cyber cooperation has seen big wins this week, with Canada<\/a> and China<\/a> signing an agreement to stop using cyber-attacks<\/a> for industrial espionage. Multilaterally, Thailand\u2019s Ministry of Foreign Affairs will host a seminar next week<\/a> to discuss ASEAN\u2019s cybersecurity cooperation and practice in the future. And the World Bank is funding a project to stand up<\/a> Zambia\u2019s National Cybersecurity Agency, with Israeli cybersecurity company CyGov providing advice and expertise<\/a>.<\/p>\n

WannaCry has continued to infect pockets of unpatched systems this week, striking a Honda factory<\/a> and forcing the factory to temporarily shut down while fixes were applied. WannaCry has also affected traffic cameras in Victoria<\/a>. Initial statements from the Victorian government<\/a> indicated that the overall system wasn\u2019t compromised and that all infringements would remain, but that was later<\/a> reversed<\/a>, with the government stating they would \u2018quarantine<\/a>\u2019 and review infringements generated by the affected cameras. The contradiction seems to indicate that the Victorian government is struggling with its communications and decision-making processes in the event of cyber incidents.<\/p>\n

The US national security community seems to be embracing open source development communities, with the National Security Agency (NSA) joining GitHub to launch a page<\/a> that shares the details of 32 different projects<\/a>. Similarly, the Department of Homeland Security has announced a Kaggle competition<\/a> for passenger screening, sharing valuable training data and offering a US$1.5 million reward to the team that develops an algorithm for body scanners<\/a> to automatically identify concealed objects. There\u2019s been some involuntary technology sharing between the national security and open source communities, too, with WikiLeaks releasing more technical documentation<\/a> on CIA hacking tools from \u2018Vault7<\/a>\u2019 The latest leak has provided details on a toolset called \u2018Brutal Kangaroo\u2019<\/a>, designed to spread through infected USBs and, potentially, infiltrate air-gapped computers.<\/p>\n","protected":false},"excerpt":{"rendered":"

The UK Parliament\u2019s e-mail system was targeted by a sustained brute-force password-guessing attack last Friday, forcing parliamentary staff to temporarily block remote email access and mandate password changes. The \u2018rudimentary\u2019 but effective attack resulted in …<\/p>\n","protected":false},"author":608,"featured_media":32603,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[416,391,928],"class_list":["post-32602","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-australian-government","tag-cyber","tag-five-eyes"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The UK Parliament\u2019s e-mail system was targeted by a sustained brute-force password-guessing attack last Friday, forcing parliamentary staff to temporarily block remote email access and mandate password changes. The \u2018rudimentary\u2019 but effective attack resulted in ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-28T02:30:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-06-27T12:43:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/06\/email-1903444_640.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"341\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Chi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Chi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/06\/email-1903444_640.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/06\/email-1903444_640.jpg\",\"width\":640,\"height\":341,\"caption\":\"Image courtesy of Pixabay user geralst.\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/#primaryimage\"},\"datePublished\":\"2017-06-28T02:30:24+00:00\",\"dateModified\":\"2017-06-27T12:43:06+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9\",\"name\":\"Michael Chi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g\",\"caption\":\"Michael Chi\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/michael-chi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The UK Parliament\u2019s e-mail system was targeted by a sustained brute-force password-guessing attack last Friday, forcing parliamentary staff to temporarily block remote email access and mandate password changes. The \u2018rudimentary\u2019 but effective attack resulted in ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2017-06-28T02:30:24+00:00","article_modified_time":"2017-06-27T12:43:06+00:00","og_image":[{"width":640,"height":341,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/06\/email-1903444_640.jpg","type":"image\/jpeg"}],"author":"Michael Chi","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Michael Chi","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/06\/email-1903444_640.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/06\/email-1903444_640.jpg","width":640,"height":341,"caption":"Image courtesy of Pixabay user geralst."},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/#primaryimage"},"datePublished":"2017-06-28T02:30:24+00:00","dateModified":"2017-06-27T12:43:06+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-170\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9","name":"Michael Chi","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g","caption":"Michael Chi"},"url":"https:\/\/www.aspistrategist.ru\/author\/michael-chi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/32602"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/608"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=32602"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/32602\/revisions"}],"predecessor-version":[{"id":32604,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/32602\/revisions\/32604"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/32603"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=32602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=32602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=32602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}