• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

A former top Canadian spy told us about 4 huge cyber threats that are emerging

M0TAR0

Alfrescian
Loyal

A former top Canadian spy told us about 4 huge cyber threats that are emerging


NATASHA BERTRAND TECH MAY. 13, 2015, 12:41 AM

gop-sony-hack-4.jpg


The initial warning left on Sony computers by hackers.

Technology researchers estimate that anywhere from 25-50 billion devices, or more than three for every person on the planet, will be connected to the internet by the end of 2020.

And as the internet of things grows, so does the number of threat actors bent on exploiting its ubiquity.

Hackers’ attacks are becoming more sophisticated and targeted as they gain confidence and learn to exploit the many mistakes people make every day in protecting — or rather, failing to protect — their information.

Cyber warfare is uniquely dangerous in that it gives enormous power to nation-states, hacktivists and malicious non-state actors who would normally pose little or no threat to their adversaries. As a result, we are witnessing a new arms race for cyber offensive (and defensive) capabilities.

These capabilities can be stolen or reverse-engineered, however, after they are developed and released into the wild.

“What is a great cyber intelligence tool today is tomorrow’s exploit,” Ray Boisvert, former Director General of the Counter Terrorism program for the Canadian Security Intelligence Service (CSIS), told the highly technical Infiltrate hacking conference in April.

ray-boisvert.jpg


Ray Boisvert

He highlighted Stuxnet, an incredibly powerful computer virus created by the NSA and Israel that Tehran successfully reverse-engineered before turning it into their own cyber-weapon to destroy the servers of Saudi Arabia’s national oil and natural gas company.

Boisvert, who is now a senior associate specializing in cyber and insider threats at Hill+Knowlton Strategies Canada, outlined to Business Insider four major ways that advancements in internet technology could threaten national security.

Cyber advancements allow for asymmetrical warfare

America’s unrivaled military prowess is in danger of becoming irrelevant as foreign actors continue to develop and leverage their technological capabilities to disrupt and destroy critical infrastructure — all from halfway across the world.

“Cyber warfare doesn’t require a significant number of troops or a superior set of bombs,” cybersecurity expert David Kennedy, founder of the security consulting firm TrustedSec, told Business Insider. “Iran was the first to capitalize on that.”

Iran is building its cyber warfare capabilities faster than experts “would have ever imagined.” Attacks by Iranian hackers have targeted the military, oil and gas, energy and utilities, transportation, airlines, airports, hospitals and aerospace industries, among others, and have taken place at over 50 companies in 16 countries — 10 of which have been in the US.

North Korea’s hack of Sony Pictures in December was unprecedented in both size and scope, downing Sony’s system and releasing upwards of 11 terabytes of internal company data. And the State Department is still struggling to purge Russian hackers from its system 6 months after suffering its “worst ever” attack.

sony-37.jpg


People walk past a TV screen showing a poster of Sony Picture’s “The Interview” in a news report, at the Seoul Railway Station in Seoul, South Korea, Monday, Dec. 22, 2014.

Cyber warfare is being incorporated into the military doctrines of nation-states

“In 10 years time, Iran’s cyber capabilities will be more troubling than its nuclear program,” geopolitical expert Ian Bremmer, president of the Eurasia group, tweeted last month.

Iranian President Hassan Rouhani has increased the government’s cybersecurity spending 12-fold since taking office, giving the Islamic Revolutionary Guard Corps (IRGC) an annual cybersecurity budget of roughly $19.8 million.

About 1,500 Iranian cyber-warriors “have assumed their duties and will in the future carry out many operations,” according to IRGC commander Hossein Hamedani.

iranian-cyber-attacks.jpg


On February 2011, the Iranian Cyber Army launched an attack against the Voice of America’s web site.

China recently increased its cyber warfare spending by 20-30% in what experts say is a major attempt to compete with superior US military cyber capabilities.

“They [the Chinese] have previously devoted substantial resources to cyber espionage and theft,” cyber security expert and former Department of Homeland Security policymaker Paul Rosenzweig told the Free Beacon. “China’s vision of combined operations, with cyber as a strong component of its capability, will significantly challenge American freedom of action in the Pacific.”

And Russia is reportedly building its own cyber command, which “will be responsible for conduction offensive cyber activities, including propaganda operations and inserting malware into enemy command and control systems,” according to a report delivered to the Senate in March by US director of national intelligence, James Clapper.

Boisvert mentioned the 2010 hack of Nasdaq, when Russian-backed hackers inserted malware that could destroy the system from the inside.

“In early January [2011], the NSA presented its conclusions to top national security officials: Elite Russian hackers had breached the stock exchange and inserted a digital bomb,” Michael Riley of Bloomberg Business reported in 2014.

Identity theft is becoming more widespread

The frequency of identity theft has increased dramatically, according to a report released last year by the National Security Agency, and cost Americans $10 billion more than burglary, car theft, and property theft combined in 2012.

hackers-8.jpg


People pose in front of a display showing the word ‘cyber’ in binary code, in this picture illustration taken in Zenica December 27, 2014.

Threat actors ranging from hacktivists to nation-states participate in identity theft, often to ruin an individual’s or company’s reputation, finances, or legal standing.

When it comes to finding security holes in a company’s information system, people hired to hack into a company’s systems start with what is often the biggest and clearest vulnerability — its employees.

At Infiltrate, a professional penetration tester for a major company in Silicon Valley told Business Insider that the easiest way to infiltrate a client’s system is to bait an employee into clicking on an infected link in a seemingly innocuous email.

From there, the hacker for hire can acquire the employee’s username, passwords, and other sensitive information — which can lead a hacker into the company’s system.

This tactic, known as “phishing,” can be executed by unskilled scammers. When executed by a professional, however, phishing becomes a highly targeted tool.

Hackers could target SCADA systems — and cause a disaster


Last November, the US Department of Homeland Security discovered that SCADA systems controlling various industrial processes (such as the power grid and oil and gas pipelines) had been attacked by Russian hackers using BlackEnergy malware, ABC reported.

It was not the first time hackers tried to cripple vital US infrastructure — in 2012, Schnieder Electric’s SCADA system was reportedly hacked by the Chinese.

SCADA (supervisory control and data acquisition) is a type of industrial control system that monitors and controls key infrastructure in the US and around the world. Processes controlled by SCADA include water treatment and distribution, electricity, heating, and, perhaps most worryingly, airplanes and trains.

Boisvert told Infiltrate he was initially concerned that a deadly July 2013 train crash in Spain was caused by a hacker (it turned out to be human error).


Nevertheless, his point remains: As transport systems become more hi-tech, they will also become more vulnerable to attack.

When the UK announced early last month that a new hi-tech rail traffic system would soon control all of Britain’s trains, experts worried aloud whether the system could potentially be hacked to cause a serious crash.

“We know that the risk [of a cyber-attack] will increase as we continue to roll out digital technology across the network,” a spokesman for Network Rail told the BBC.

And some cybersecurity experts fear that hackers aboard an aircraft could bring down the plane using the on-board Wi-Fi many commercial jets now offer to passengers.

“Modern aircraft are increasingly connected to the internet. This interconnectedness can potentially provide unauthorized remote access to aircraft avionics systems,” the US Government Accountability Office (GAO) said in a statement.

Michael B. Kelley contributed to this report.


 
Top