fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Five Russian Hacks That Transformed US Cyber-Security

Five Russian Hacks That Transformed US Cyber-Security

The latest hack, allegedly by Russia, is a reminder that Moscow is America’s oldest adversary in cyber-space.

For more than three decades, hackers linked to Moscow are believed to have tried to steal US secrets online.

Those breaches of US systems have done much to define how America sees cyber-space, and how it defends itself.

And they have learnt it is not always possible to predict, or stop, Moscow’s efforts.

1) Cuckoo’s Egg

The first person to trail foreign hackers taking sensitive US data was not a spy, but an astronomer who was worried about an unpaid $0.75.

Cliff Stoll looked after the computer networks at his lab. In 1986, he noticed someone logging in to use the computer without paying. In the coming months, he would follow their trail and observe the unknown party searching for military-related data.

In his book, Cuckoo’s Egg, Stoll reveals how he eventually traced the login to a group of hackers in Germany, who had sold their access to the KGB, Moscow’s intelligence service.

It led Stoll to involve America’s intelligence community.

As the first country to move information online, Stoll’s discovery was the first indication that the US was going to be a lucrative target for foreign hackers.

2) Moonlight Maze

A decade later, in the mid 1990s, the first major cyber-espionage campaign conducted by a state intelligence agency was uncovered.

Codenamed Moonlight Maze, some of the details remain classified. But this was a group of high-end hackers working “low and slow” to steal US military secrets through a backdoor.

The hackers took vast amounts of information. And, for the first time, defence officials also feared they might leave something behind – to sabotage their systems.

US investigators were confident they knew who was behind it. The attackers worked 08:00 to 17:00 Moscow time (but never on a Russian holiday) and Russian language was found in the code.

Moscow denied everything, and stalled the investigation.

Among those who worked on the investigation was Kevin Mandia – currently chief executive of security firm FireEye. Those involved say it was the first time they understood the sophistication of their adversary, believed to be a successor organisation to the KGB.

Also Read: The Importance Of Knowing Personal Data Protection Regulations

3) Buckshot Yankee

Someone picked up something they should not have done and put it in a computer.

A familiar story these days maybe – but, in 2008, the rogue USB stick loaded with malware – possibly found in a car park on a military base overseas – rocked Washington.

It allowed hackers to penetrate classified US military systems which were supposed to be kept offline.

It took four months for an analyst to spot the breach at US Central Command and the clear-up, codenamed Buckshot Yankee, took even longer.

US Cyber Command joint operations center on the NSA campus is seen on May 25, 2020, in Fort Meade, Maryland
image captionThe US Cyber Command joint operations centre on the NSA campus in Fort Meade, Maryland

It was linked to the same group that was behind Moonlight Maze.

The shock led directly to the creation of US Cyber Command within the Pentagon – a team set up to protect sensitive networks, but also to hunt adversaries online.

4) The Democrats

In the subsequent years, China began to receive more focus – particularly with regard to stealing commercial secrets.

But Russia had not gone away.

During the 2016 US presidential election, it turned out that not one, but two, Russian intelligence service hacking teams were inside the Democratic party.

The team from the foreign intelligence agency, the SVR, stayed undercover – but the military intelligence team from the GRU – Fancy Bear – had a different plan in mind.

It leaked the material it stole, causing disruption and, arguably, playing a role in shifting the course of the election.

The problem was no one had been prepared for this kind of “information operation”.

This time round, in the 2020 presidential election, companies and officials were on their guard for election interference from Russia.

But what they didn’t realise was that old-fashioned espionage was carrying on unnoticed – with Russian intelligence again believed to be the culprit. Once more Moscow has denied any role.

5) Sunburst

The exact impact of the Sunburst breach, through the company SolarWinds, is not yet clear. Nonetheless, federal officials talk of a “grave risk” because of the sheer scale of possible compromise of departments, companies and organisations.

It is not “espionage as usual”, Microsoft President Brad Smith argues.

But others disagree, calling it pretty much routine espionage. They add that the US is not just the victim, but also the perpetrator of these type of hacks. The Snowden revelations of 2013 showed the US (and UK) were more than capable of targeting other countries’ secrets by compromising hardware and software from reputable firms – in a way that is not that different to this latest breach.

Also Read: The Scope Of Singapore Privacy: How We Use It In A Right Way

The troubling question this hack may raise, though, is that – after more than 30 years of experience and massive investment – why did it still take so long to spot and stop the breach?

The answer? In cyberspace the attacker normally has the advantage in finding a new way in before the defender can close off that gap.

And as long as there are secrets online, the most capable spies – especially those in Russia – will be out to steal them.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us