{"id":32717,"date":"2017-07-05T12:27:39","date_gmt":"2017-07-05T02:27:39","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=32717"},"modified":"2017-07-05T15:51:38","modified_gmt":"2017-07-05T05:51:38","slug":"cyber-wrap-171","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/figure>\n

What\u2019s old is new again this week, with ransomware from 2016, \u2018Petya<\/a>\u2019, again taking the world by storm, infecting machines across 65 countries<\/a>. Except that\u2019s not really the case, as Janus Cybercrime Solutions, the original creators of Petya, have publicly stated on Twitter<\/a> that they are not behind the recent outbreak of Petya. Other analysts have also pointed out the significant differences between the March 2016 original and the recent outbreak which is masquerading itself as \u2018Petya\u2019. They\u2019ve come up with a variety of names<\/a> referencing the \u00a0deception: \u2018NotPetya<\/a>\u2019, \u2018Petna<\/a>\u2019, \u2018Nyetya<\/a>\u2019, or only \u2018SortaPetya<\/a>\u2019, or now completely different: \u2018GoldenEye<\/a>\u2019 or \u2018PetrWrap<\/a>\u2019. Naming issues aside, most<\/a> commentators<\/a>, including NATO Cyber Defence researchers<\/a>, have<\/a> concluded<\/a> that this version of Petya<\/a> is a data wiper in disguise<\/a>, and that the token ransom note is part of an effort to create \u2018plausible deniability<\/a>\u2019 for a wider objective.<\/p>\n

The Ukrainian security service<\/a> has gone a step further, and firmly laid the blame for Petya<\/a> on Russia as a method to disrupt Ukrainian businesses as part of an ongoing cyber and hybrid war. Publicly available data indicates that Ukraine was the country hardest hit<\/a>, and that the attack began<\/a> spreading on a mass scale after a malicious update was pushed across a widely used Ukrainian tax program<\/a>, M.E. Doc. Ukrainian cybercrime police are considering charging the company<\/a> with neglect, after the company ignored repeated warnings that its servers had a number of vulnerabilities.<\/p>\n

The Australian government has announced the creation of a new, uniformed, \u2018Information Warfare Unit\u2019<\/a> within the ADF, with plans to grow the 100 cyber security specialists to 900 within the next 10 years to better protect military networks and mount offensive cyber operations. Also here in Oz, critical infrastructure protection is continuing to prove a trouble area, as the Queensland Audit Office has found that Queensland\u2019s water service providers<\/a> are vulnerable. One of the key weaknesses identified<\/a> has been the lack of a central coordinating agency within the Queensland government on cyber issues. The Auditor-General of Western Australia has expressed similar, broader concern<\/a> about five WA government information systems, finding that the \u2018same common weaknesses<\/a>\u2019 are found \u2018year after year\u2019, with little to no action on the part of agencies.<\/p>\n

Federally, the Australian National Audit Office has<\/a> approved of the Department of Human Services\u2019 myGov implementation<\/a>. The department has been active in procuring new digital capability in other areas as well, including data extraction devices from Cellebrite, the same technology used by the FBI to crack security measures in the San Bernardino attacker\u2019s phone in 2015. The purchase has raised concerns about why<\/a> Centrelink investigations would require a capability that has previously been restricted to national security and law enforcement applications.<\/p>\n

The Five-Country Ministerial meeting on National Security in Ottawa has concluded<\/a>, and the partner countries have announced that they will be<\/a> approaching communication service providers to establish an industry forum and build better cooperation to counter violent extremist messaging. The governments will engage with \u2018communications and technology companies to explore shared solutions\u2019 to access encrypted messaging, demonstrating further movement towards thwarting the encryption of terrorist messaging highlighted as priorities by Prime Minister Turnbull and Attorney-General Brandis in previous<\/a> statements<\/a>.<\/p>\n

Antitrust regulators from the EU have issued Google with a landmark<\/a> \u20ac2.42 billion fine for favouring Google Shopping in its search results<\/a>, after numerous complaints from competitor companies that they were being excluded from Google\u2019s search results<\/a>. Google\u2019s been provided 90 days to adjust its search ranks equitably, and faces the risk of being slapped with further fines of \u20ac10.6 million for every day of non-compliance that passes after that time<\/a>, equivalent to 5% of daily global turnover. Similar investigations are being conducted into Google\u2019s conduct in the smartphone<\/a> and advertising markets<\/a>. The EU has spent up to \u20ac10 million for a team<\/a> of technology consultants that can analyse Google\u2019s search engine for discriminatory and anti-competitive behaviours. The bold regulatory moves come in advance of the General Data Protection Regulation\u2019s activation in 2018, which will expand and escalate data protections and punitive actions, indicating that the EU will be backing its information security laws with some teeth.<\/p>\n

Cyber laws and norms have suffered a setback at the United Nations, as a group of government experts\u2019 report has fallen short of its lofty goals<\/a> to formally apply international law to cyberspace after being rejected by a small number of states<\/a>, including Cuba, Russia and China. The states objected to the report\u2019s reference to the possible use of countermeasures and self-defence, and its deference to international humanitarian law regarding proportionality in crafting responses to cyber attacks. The Americans were forthright in declaring<\/a> it a ploy to allow them to use \u2018cyberspace to achieve their political ends with no limits or constraints on their actions\u2019.<\/p>\n

For those looking for some good longreads, The Financial Post<\/em> has published a comprehensive piece<\/a> detailing the creation of Etherium and what it means for Blockchain. Bloomberg has provided a retrospective on the development<\/a> of the Chaos Computer Club, an association of white-hat hackers who have been forcing the German government to fix things (by breaking them) since 2006. Finally, ProRepublica<\/em> has published the details of its investigation into Facebook\u2019s opaque internal moderation standards and policies when it comes to flagging and removing violent extremist content<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

What\u2019s old is new again this week, with ransomware from 2016, \u2018Petya\u2019, again taking the world by storm, infecting machines across 65 countries. Except that\u2019s not really the case, as Janus Cybercrime Solutions, the original …<\/p>\n","protected":false},"author":608,"featured_media":32719,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[416,391,928,300,1948],"class_list":["post-32717","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-australian-government","tag-cyber","tag-five-eyes","tag-google","tag-ransomware"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"What\u2019s old is new again this week, with ransomware from 2016, \u2018Petya\u2019, again taking the world by storm, infecting machines across 65 countries. Except that\u2019s not really the case, as Janus Cybercrime Solutions, the original ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-05T02:27:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-07-05T05:51:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/07\/33318605932_93fdd4588d_b.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"575\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Chi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Chi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/07\/33318605932_93fdd4588d_b.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/07\/33318605932_93fdd4588d_b.jpg\",\"width\":1024,\"height\":575},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/#primaryimage\"},\"datePublished\":\"2017-07-05T02:27:39+00:00\",\"dateModified\":\"2017-07-05T05:51:38+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9\",\"name\":\"Michael Chi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g\",\"caption\":\"Michael Chi\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/michael-chi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"What\u2019s old is new again this week, with ransomware from 2016, \u2018Petya\u2019, again taking the world by storm, infecting machines across 65 countries. Except that\u2019s not really the case, as Janus Cybercrime Solutions, the original ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2017-07-05T02:27:39+00:00","article_modified_time":"2017-07-05T05:51:38+00:00","og_image":[{"width":1024,"height":575,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/07\/33318605932_93fdd4588d_b.jpg","type":"image\/jpeg"}],"author":"Michael Chi","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Michael Chi","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/07\/33318605932_93fdd4588d_b.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/07\/33318605932_93fdd4588d_b.jpg","width":1024,"height":575},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/#primaryimage"},"datePublished":"2017-07-05T02:27:39+00:00","dateModified":"2017-07-05T05:51:38+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-171\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9","name":"Michael Chi","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g","caption":"Michael Chi"},"url":"https:\/\/www.aspistrategist.ru\/author\/michael-chi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/32717"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/608"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=32717"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/32717\/revisions"}],"predecessor-version":[{"id":32721,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/32717\/revisions\/32721"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/32719"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=32717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=32717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=32717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}