26.05.2017 Views

GSN_Apr_FINAL+links

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Cyber Threats & Solutions<br />

Cybersecurity executives ‘Wannacrypt’ ransomware<br />

attack a wake-up call for industry, government leaders<br />

By Steve Bittenbender<br />

Editor, Government Security News<br />

The ransomware attack that plagued<br />

the globe on Friday must serve as a<br />

“wake-up call” to both industry and<br />

government leaders that the time for<br />

urgent action is now. That’s how one<br />

of Microsoft’s top executives reacted<br />

to the “WannaCrypt” attack that<br />

targeted computer systems in various<br />

industries worldwide, including<br />

healthcare and government systems.<br />

“WannaCrypt,” also dubbed<br />

“WannaCry,” was a ransomware attack<br />

that paralyzed hospitals in Great<br />

Britain and even FedEx in the United<br />

States, although the attack seemed<br />

to focus mainly on Russian servers<br />

based on information provided from<br />

Kapersky Labs. A ransomware attack<br />

is where a hacker encrypts files and<br />

threatens to destroy the data if the<br />

ransom – in the case of “WannaCrypt,”<br />

it was at least $300 in Bitcoin<br />

– is not paid within a certain time.<br />

In a Sunday blog post on Microsoft’s<br />

Web site, company President<br />

and Chief Legal Officer Brad Smith<br />

said the hackers used material stolen<br />

from the National Security Agency<br />

Brad Smith<br />

to perpetrate the attack. The NSA<br />

breach had been previously reported,<br />

and, in March, Microsoft released<br />

a patch to its users to protect<br />

them from an attack. While some users<br />

updated their systems, others did<br />

not, and they were the ones scrambling<br />

on Friday.<br />

The ransomware attack<br />

“demonstrates the degree to<br />

which cybersecurity has become<br />

a shared responsibility<br />

between tech companies<br />

and customers,” Smith said.<br />

“The fact that so many computers<br />

remained vulnerable<br />

two months after the release<br />

of a patch illustrates this aspect. As<br />

cybercriminals become more sophisticated,<br />

there is simply no way<br />

for customers to protect themselves<br />

against threats unless they update<br />

their systems. Otherwise they’re literally<br />

fighting the problems of the<br />

present with tools from the past.”<br />

Dan Matthews, a sales engineer<br />

with Lastline, said network managers<br />

had another option to prevent the<br />

attack if they were not able to get the<br />

patch installed in time.<br />

He, like other experts, said the ransomware<br />

attack served as an important<br />

reminder of being proactive in<br />

managing cybersecurity risks.<br />

“In practice things are often more<br />

complicated and there are legitimate<br />

reasons for needing more time to<br />

implement a patch,” Matthews said.<br />

“Organizations who are unable to<br />

deploy Microsoft’s (or other<br />

software vendors’) critical<br />

patches in a timely manner<br />

can instead implement advanced<br />

email and network<br />

protections that are capable<br />

of detecting ransomware<br />

and preventing the delivery<br />

of these payloads to unpatched<br />

computers.”<br />

Ofer Israeli, CEO and founder of<br />

Illusive Networks, said he expects<br />

hackers will continue to use the stolen<br />

NSA material for other attacks.<br />

“In this case, we are seeing an opportunistic<br />

ransomware operation,<br />

but we can expect the exploit is already<br />

being used for surgical targeted<br />

attacks, the outcome of which will<br />

only be revealed in a few months,<br />

due to the time it takes to execute<br />

a sophisticated targeted attack,” he<br />

said.<br />

Brian Lord, OBE, managing director<br />

for British-based PGI Cyber, said<br />

the attacks were “always inevitable.”<br />

Lord also echoed Smith’s comments<br />

on this being a wake-up call.<br />

“While organizations are distracted<br />

by high profile dramatized threats,<br />

such as Russian election hacking,<br />

they are neglecting basic cyber hygiene<br />

measures which can prevent<br />

the mass effectiveness of mass ransomware<br />

attacks like this,” said Lord,<br />

the former director of deputy director<br />

for intelligence and cyber operations<br />

for Britain’s Government Communications<br />

Headquarters.<br />

Smith added that it’s time government<br />

leaders readdress their<br />

cybersecurity policies, as attacks<br />

like “WannaCrypt” are becoming<br />

an emerging problem this year. He<br />

equated the NSA losing its coding to<br />

the military having a few Tomahawk<br />

missiles taken.<br />

“This is one reason we called in<br />

February for a new ‘Digital Geneva<br />

Convention’ to govern these issues,<br />

including a new requirement for<br />

governments to report vulnerabilities<br />

to vendors, rather than stockpile,<br />

sell, or exploit them,” Smith said.<br />

“And it’s why we’ve pledged our support<br />

for defending every customer<br />

everywhere in the face of cyberattacks,<br />

regardless of their nationality.”<br />

40 41<br />

<strong>GSN</strong>’s 2017<br />

Airport/Seaport/Border Security Awards<br />

Now Including Cybersecurity Solutions for Airport, Seaport,<br />

Border Security Markets<br />

All Winners in this program are<br />

entitled to a Full-Page Advertisement<br />

(8.5” x 9.0”) in your choice of <strong>GSN</strong>’s<br />

Digital Magazine or Leaderboard in<br />

any edition of the Airport, Seaport,<br />

Rail, Border Security Weekly<br />

Newsletter.<br />

Adrian Courtenay<br />

Managing Partner, CEO<br />

Government Security News<br />

917-696-5782<br />

acourtenay@gsnmagazine.com<br />

NEW IN 2017:<br />

CLICK HERE TO SUBMIT ENTRIES<br />

All Finalists are entitled to a Half-<br />

Page Advertisement (8.5” x 4.5”) in<br />

your choice of <strong>GSN</strong>’s Digital Magazine<br />

or Leaderboard in any edition of the<br />

Airport, Seaport, Rail, Border Security<br />

Weekly Newsletter.<br />

Steve Bittenbender<br />

Managing Editor<br />

Government Security News<br />

502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Gerry O’Hara<br />

Designer<br />

OHDesign3<br />

203-249-0626<br />

gerry@ohd3.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!