Are things really as bad as the ABC Four Corners’ Cyber War documentary makes out?

The Australian Broadcasting Corporation’s Four Corners' Cyber War program, aired tonight, highlighted the personal, commercial and national threats posed by hackers and a general preparedness on all things cyber security.

The program started by looking at hackers a this year’s DEF CON hacking conference and highlighted just how vulnerable any piece of technology connected to the internet actually is. They proceeded at rapid pace to move from phones, bank accounts and cyber crime to alleged nation state hacking, including the hack of the Australian Bureau of Meteorology, revealed in December of last year.

The first thing to point out is that nothing reported in the program tonight is particularly new. DEF CON has been running since 1993. The types of hacks outlined by the ABC journalist this year at DEF CON have been highlighted for many years now. Kevin Mitnick, interviewed in the program in his current role as a cyber security specialist, was convicted and jailed for his hacking crimes stretching back to the 1980s.

Certainly, things have gotten worse in recent years because of the increasing levels of activities that the general public, organisations and government are carrying out on the internet. There is also a massive cyber crime industry which is estimated to now cost the global economy around US$500 billion a year.

There is also no doubt that state sponsored hacking and full cyber warfare is proceeding unabated.

What is not at all certain, though, is the increasing rhetoric around accusations of Chinese government involvement in hacks that are only stated as “originating” in China.

In the ABC program, a former IT manager of NewSat, a satellite communications company, makes the claim that their network was infiltrated by hackers and that these hackers originated from China and that they were sophisticated and so obviously well funded.

Unfortunately, no evidence is provided to support any of these assertions. Given that the IT manager also stated that their network security was deemed the worst that a government security organisation had ever seen, it is entirely possible that they had been hacked by any number of people.

Contrary to the impression created by the program, NewSat’s main problems were financial, with financial mismanagement and defaulting on payments for the satellite a major cause for the company going into administration. NewSat’s directors are now potentially facing criminal charges around the financial dealings of the company.

It is possible that the company did have technical issues in addition to the financial ones it was going through. But with no evidence provided for NewSat’s breaches, it is very hard to take seriously claims that these hacks were the work of the Chinese Government.

Another focus of the program was around the use of so-called Zero Day) exploits. These threats, are previously unknown vulnerabilities in a product that can be exploited before the manufacturer or developer is aware of them and can issue a patch.

It was a series of Zero Day vulnerabilities identified in Apple’s iPhone operating system recently that caused it to release an immediate update (version 9.3.5) that the media were quick to sensationalise.

The salient point about this vulnerability was that the company that was allegedly behind exploiting it was selling that capability for hundreds of thousands of dollars. It was being used to target specific individuals by their own government. This was not something that was ever likely to be a widespread problem for the general public. The iPhone still remains a generally very secure platform.

What wasn’t mentioned in the documentary was the far more common problems that still exist with the public, organisations and government agencies simply not updating their software and systems regularly and often. It is this fact, combined with the relative ease of phishing attacks by email and text that present the biggest challenges to general cyber security.

Stories like the ABC Four Corners’ report fail to mention the other side of the equation which is that actually, companies have made improvements in recent years in both their attitudes to security and their implementation of this in their products.

Companies like Apple, Google and others are continually building systems that are secure by design. Governments, including Australia’s are increasingly developing their capabilities in the area of cyber security and ensuring that the public and companies are using an increasing array of preventative security strategies.

Whilst cyber security is an ongoing issue, the focus perhaps should emphasise what is actually being done to keep systems safe rather than continually focusing on bleak outlooks that are increasingly the norm.

Read this article and more at The Conversation

Source: The conversation

Topics: Social Engineering, satellite communications, technology, Google, hacking conference, penetration testing, phishing simulation, Cina hacks, commercial threats, building secure systems, Bureau of Meteorology, cyber security consultant, cyber warfare, Four Corners, hackers, internet, IT manager, national threats, Newsat, phishing attacks, preventative security strategies, Mitnick Security Training, Zero Day, Apple, Apple iPhone, Australian Broadcasting Corporation, Chinese government, cyber crime, cyber crime industry, Cyber War, DEF CON, network infiltrated, operating system vulnerabilities, global economy, Kevin Mtinick, nation state hacking, NewSat criminal charges, NewSat's financial dealings

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Redefining Your Enterprise’s Cyber Security Posture During Mergers & Acquisitions

With 3,205 data compromises occurring in 2023 alone, fortifying your enterprise’s cybersecurity posture is more important than ever.

Read more ›

Choosing a Penetration Testing Company for Mac-based Environments

Powering your business with Apple devices because of their reputable security and privacy features? You may be surprised to learn that while Apple dev..

Read more ›

AI in Cyber Security: Impacts, Benefits, and More To Be Aware Of

Artificial intelligence in cybersecurity has been a hot topic lately, especially with the rise of OpenAI’s ChatGPT. But does that mean it would make a..

Read more ›