Showing posts with label Information Security. Show all posts
Showing posts with label Information Security. Show all posts

Monday, September 4, 2023

The importance of Information Security in our lives – Part 6

 

6. In our relaxing time

In these moments even our relaxing time is related to the use of a PC or to an streaming service, we should be more careful in the following:

6.1. As mentioned in Part 5, do not lick on links that are coming from any of the services your are registered to

6.2. Always confirmed, as possible, when you received emails where there are requests to provide personal information like bank accounts, credit cards, etc. if possible, call the requesting organization to confirm if the data request is official

6.3. If you receive messages to your mobile phone requesting personal information like bank accounts, credit cards, etc. either via text messages, or through another applications like WhatsApp, Line, etc. do not take action and confirm with the requesting organization of the veracity of the request

6.4. Be careful of the sites you visit. Due to there are several illegal copies of those where users could be redirected to illegally obtain personal information.

6.5. Do not click on ads of doubtful origin. There are several available technics to force malicious software package installations in the user’s PC with only visiting a page.

La importancia de la seguridad de la información en nuestras vidas – Parte 6

 


6. En nuestros tiempo de ocio

En estos momentos en los que inclusive en nuestros momentos de ocio estajos ligados a una PC o a un servicio de transmisión en línea, debemos de tener cuidado en los siguientes aspectos:

6.1. Así como el punto anterior, no hacer click en enlaces que provengan de estos servicios de transmisión en línea

6.2. Siempre confirmar, en la medida de lo posible, cuando se reciben correos en el que se hacen pedidos de cuentas bancarias, datos personales, tarjetas de crédito, etc., si es posible comuníquese por teléfono con su entidad bancaria para poder confirmar si es oficial el pedido de estos datos.

6.3. En el caso del teléfono móvil si se reciben mensajes con pedidos de cuentas bancarias, datos personales, tarjetas de crédito, etc., ya sea por mensajes de texto o por medio de aplicaciones de chat como: WhatsApp, Line, etc., no tomar acción y confirmar con la entidad bancaria por teléfono si ese tipo de pedido es oficial.

6.4. Tener en cuenta los sitios web que se visitan, ya que existen muchas copias ilegales de estos en los que los usuarios pueden ser redirigidos para obtener de manera ilegal datos personales

6.5. No hacer click en publicidad de dudosa procedencia. Existen muchas técnicas disponibles para poder forzar la instalación de paquetes de software de carácter malicioso en la computadora del usuario con tan solo hacer que este visite una página web.

Monday, August 28, 2023

La importancia de la seguridad de la información en nuestras vidas – Parte 5

 


5. En nuestros viajes – Published August 14

Si bien es cierto que la pandemia del Covid-19 detuvo la gran mayoría de los viajes de negocios y de turismo, desde mediados del 2022 los viajes comenzaron a retomar su frecuencia aunque no a los mismos niveles de la pre-pandemia. De esta manera se tienen que tomar diversas medidas para proteger nuestros datos cuando hacemos reservas de pasajes de avión o de hoteles. Estas medidas son por parte del usuario, las medidas relacionadas a las empresas fueron descritas anteriormente. Estas medidas son un complemento a las medidas descritas anteriormente en la sección de comercio electrónico.

5.1. Revisar que la empresa en la que se decida realizar la reserva, es una empresa confiable y con una cierta reputación

Debido a la existencia de diversas empresas que son usadas de fachada para poder obtener datos del usuario así como los detalles del método de pago (usualmente tarjetas de crédito), se debe de tener doble cuidado en seleccionar la empresa a ser usada, algunos detalles a confirmar son

a. Reputación de la empresa

Búsqueda de la reputación de la empresa en Google

b. Confirmación del uso de certificados SSL (el candado que aparece a la izquierda de la dirección https

c. Confirmación de la política de uso y devolución de la empresa

5.2. Nunca hacer click en los enlaces que provienen de estas empresas

Antes de hacer la transacción y habiendo confirmado los pasos descritos en el punto anterior, usualmente es necesario un registro de usuario, es usual que se envíe una confirmación al correo electrónico del usuario para confirmar la identidad de este y dar por terminado el proceso de registro de usuario. Pero después de este registros, nunca, y es bueno remarcarlo nunca, se deben de hacer click en los enlaces que provienen de estas empresas así se haya confirmado su reputación. La razón es que a pesar que estas empresas puedan ser respetadas en su respectiva industria, no se puede saber si estas han sido víctimas de ataques que hayan tenido como consecuencia la extracción ilegal de datos, especialmente los datos de usuarios, de esta manera es recomendable confirmar la información de marketing incluida en el correo mediante el acceso a la página web de la empresa.

The importance of Information Security in our lives – Part 5

 


5. In our trips

While it is true that the Covid-19 pandemic stopped almost all business and leaisure trips, from the middle of 2022 travel increased in frequency although not at the same pre-pandemic levels. Due to this, we need to take additional measures to protect our data when we make online flight or hotel reservations. These measures are from the user side, company side measures where described in a previous post. These measures represent complements of the previously described measures in the ecommerce section.

5.1. Confirm that the Company to use to make reservations is a reliable Company and with a strong reputation

Due to the fact that many companies are used as front companies to obtain illegally customer data as well as payment methods (usually credit cards), we should be very careful when we select the company, some of the details to confirm are:

a. Company reputation

Search for the company’s reputatio in Google

b. SSL Certificate existence confirmation (the locker that appears to the left of the wen address

c. Use Policy and reimbursment confirmation

5.2. Never click on links that come from these companies

Before making the transaction and having comfirmed the above described points, usually is required to make a registration, it is usual to received a confirmation email to confirm the user’s identity and to finalize the registration process. After this registration process, never, and is important to emphasize it, never, make a click on links that are coming from these companies even though their reputation is confirmed. The reason is that spite of these companies are well respected in their respective business niches, it is not easy to find if they were victims of an attacked that includes data leakage, especially customer data, therefore it is advisable to confirm the marketing information included in the mail from these companies by accessing the company’s web site.

Monday, August 14, 2023

La importancia de la seguridad de la información en nuestras vidas – Parte 4

 


4. En nuestros estudios

El uso de herramientas de clases virtuales incrementó de gran manera en Perú durante la Pandemia del Covid-19, lo que hizo que muchas entidades educativas modificaran su manera de entregar conocimiento a sus alumnos. Existen diferentes estudios que confirman la falta de preparación tanto de las organizaciones educativas como de los recursos disponibles para los alumnos, aunado con la considerable brecha digital que Perú tiene como país, hizo que la educación sufriera un gran impacto negativo que posiblemente se evidenciará en los siguientes decenios.

Desde el punto de vista de la Seguridad de la Información, esta es importante debido a los siguientes puntos:

4.1. Desde el punto de vista de la organización educativa

a. Protección de los datos del alumnado

Nuestra identidad digital representa información de gran interés para los diferentes grupos cibernéticos ilegales. La obtención ilegal de la identidad de los alumnos puede acarrear consecuencias como extorsión por la información, o establecer comunicación con los padres para extorsionarlos usando ilegalmente la identidad de sus hijo/as

b. Protección de la información de la institución educativa

Las Instituciones públicas y privadas poseen una gran cantidad de información atractiva para los grupos cibernéticos ilegales, desde acceso a propiedad intelectual, cuentas bancarias de la institución educativa, cuentas bancarias de los trabajadores, detalles personales de trabajadores y alumnos, detalles de organizaciones nacionales, información de la identidad de todas los trabajadores y alumnos, etc. Esta información, si es obtenida ilegalmente, puede ser usada con distintos fines que afectarán negativamente la tranquilidad mental y económica de las personas afectadas

c. Establecimiento de canales de comunicación oficiales

Las organizaciones educativas deben de establecer canales de intercambio de información oficiales, así como canales de enseñanza oficiales. El establecimiento de canales oficiales de intercambio de información o determinación de uso de protocolos de intercambio de información seguros puede hacer más difícil ataques como Man-in-the-middle (MIM) en el que las comunicaciones entre dos puntos se interceptan para poder tener acceso a los datos que están siendo transferidos o para poder desviar las comunicaciones hacia servidores o sitios web ilegales, donde los datos serán capturados para ser usados de manera ilegal.

Ahora bien, debido a la repentina decisión de poner a la población en cuarentena, el uso de canales gratuitos de Zoom u otros similares fue la primera decisión para poder seguir brindando conocimiento a los alumnos, pero estos canales no son 100% seguros y deben de ser reemplazados por canales oficiales de las organizaciones educativas. Además de lo último, se deben de entrenar de manera obligatoria en el uso de estas nuevas herramientas digitales a los profesores a cargo de las clases para evitar cualquier ataque debido a malas configuraciones. 

4.2. Desde el punto de vista del alumno

a. Protección de la identidad y datos del alumno

Deben de crease contraseñas seguras usando caracteres alfanuméricos, caracteres especiales y letras en mayúscula y minúscula, de una considerable longitud y que solo sea lógico o familiar para el usuario; otra estrategia es el uso de frases como contraseñas, lo cual puede ser válido pero se debe de fortalecer esta contraseña con los consejos dados anteriormente. 

b. Protección de la red del hogar del alumno

Debemos de tener en cuenta los mínimos requerimientos para poder proteger nuestra red en casa, desde la modificación de la configuración del router de la empresa proveedora de internet, para hacer solo uso de canales de comunicación seguros (puertos, DNS, etc.), hasta tener nuestros sistema operativos permanentemente actualizados así como todos los paquetes de software instalados en nuestra PC.

The importance of Information Security in our lives – Part 4

 


4. In our studies

The use of virtual tools increased dramatically in Peru during the Covid-19 pandemic, which made a number of educational organizations to modify the way they share knowledge to their students. There are diverse research papers published which confirmed the lack of preparation of the educational organizations as well as the available resources for their students, together with the considerable digital gap that Peru has as a country, it made a monumental negative impact which consequences could be felt in the next decades.

From the Information Security point of view, this is important due to the following points:

4.1. From the educational organization point of view

a. Students data protection

Our digital identities represent important information for the different cybernetic malicious groups. The gathering of the students’ identity could carry negative consequences like information extortion, or establish communication with the parents to extort them using their sons/daughters identities illegally. 

b. Protection of the educational organization information 

Public and private organizations hold a large amount of attractive information for illegal cybernetic groups, from the intellectual property access, organization bank account, workers bank accounts, personal details of workers and students, national organization details, identity information of all workers and students, etc. This information, if obtained illegally, could be used in negative actions that will produce mental and economic distress to the impacted people.

c. Establishment of oficial communication channels

Educational organizations should established official communication to Exchange information. Establishing these safe official channels o protocols to exchange information could make attacks like Man-in-the-middle (MIM) where communications between two points are intercepted to have access to the data being transferred or to deviate those communications to illegal servers or sites, where data will be captured to be used illegally. 

Now, due to the sudden decision to enforce lockdowns to all population, the use of free channels like Zoom or similar was the first decision to be able to continue teaching to students, but these channels are not 100% secure and should be replaced by official channels by educational organizations. In addition to that, there must be a mandatory training to use these new digital tools to all professors to avoid attacks or misconfigurations.

4.2. From the student point of view

a. Students data an identity protection

Strong passwords should be created using alphanumeric characters, special characters and capital/lower letters, of a considerable length and to be only logical or familiar to the user: another strategy is the use of phrases as passwords, which could be valid but still should be strength with the advice provided early. 

b. Student’s home network protection

We should keep in mind the mínimum requirements to protect our network at home, from the router settings modification of the internet service provider company, to use secure communication channels (ports, DNS, etc.), to have our operative systems constantly updated as well as all software packages installed in our PCs.


Tuesday, May 9, 2023

The importance of Information Security in our lives – Part 3


3. In our jobs

IT is used in almost all Enterprise environments, from multinational corporations to the smallest startups; moreover, new startups are focused in enterprise solution creation that use IT as their supportive platforms. Services like: online banking, service payment, money transfer, tax payments, contracts negotiation and signing, client generation and engagement, marketing methods, etc., IT are used as support strategies to the main business idea.

In this environment, Information Security is represented by similar points as the ones described in the second part. The difference relies in the fact that all size companies are attractive targets for a cybersecurity attack.

3.1. Enterprise size companies

Obviously, these types of organizations have the most attractive information for the different group of hackers around who they could use the below attack techniques:

- Ransomware

- Phishing

- DDoS

- Malware

- Man In the Middle (MIM)

- Worms, etc.

These attacks have as their objective, through enterprise information kidnapping to obtain an illegal payment (ransomware), to illegally obtain enterprise information (malware, phishing, worms, etc.), or capture of the information exchange channel to deviate user transactions or requests to illegal sites (MIM). These are only a small set of the different cybersecurity attacks available for which organizations need to be prepared and take preventive measures, not only to protect their data, but even more important, to protect their customers information. 

3.2. Small or medium size business (SMBs)

Many people think small or medium size business do not represent an attractive target to the different attackers in existence, but it is not like that.

From the point of view of the organization itself, an small or medium business has as a main target to grow, these types of organizations make all possible efforts to establish commercial relationships with enterprise size organizations already established in their particular business niche of interest. When SMBs organizations are able to become business partners it is the time they become attractive to the different cybersecurity attacks due to the trust relationship established between the enterprise size organization and the SMB. The different hacker groups take advantage of these trust relationship in order to attack the SMB, establishing a persistent method and confirm the communication channel used to modify the worm payload to do a lateral movement and impact the enterprise size organization.

As you can see Information Security plays a key role in the data interchange between same niche organizations and associated sectors. Information Security controls must be installed in both organizations’ group, in addition to this, enterprise size organizations need to establish frequent third party security assessment process with their, all size, business partners.

La importancia de la seguridad de la información en nuestras vidas – Parte 3


3. En nuestro trabajo

La TI es usada en casi todos los ambientes empresariales, desde las grandes corporaciones hasta las más pequeñas startups, más aún, las nuevas startups están enfocadas en la creación de soluciones empresariales que usan como plataforma base las TI. Servicios desde banca electrónica, pago de servicios, transferencia de dinero, pago de impuestos, negociación y firma de contratos, generación de clientes, métodos de marketing, etc., las TI son usados como estrategias de soporte a la idea principal del negocio.

En este ambiente, la Seguridad de la Información está representada por puntos similares a los descritos en segunda parte. La diferencia radica en que empresas de cualquier tamaño son objetivos atractivos para un ataque cibernético.

3.1. Grandes empresas

Obviamente, este tipo de empresa posee información atractiva para los diferentes grupos de hackers los cuales pueden ejecutar ataques como:

- Ransomware

- Phishing

- DDoS

- Malware

- Man In the Middle (MIM)

- Worms, etc.

Estos ataques tienen como objetivo, ya sea el secuestro de la información de la empresa en pos de obtener un pago (ransomware),  la obtención ilícita de información de la empresa (malware, phishing, worms, etc.), o la captura del canal de intercambio de información para poder desviar las transacciones de usuarios hacia un sitio ilegal (MIM). Estos son solo una pequeña muestra de los diferentes ataques cibernéticos disponibles para los que las empresas tienen que estar preparadas y tomar iniciativas de prevención para no solo proteger sus datos, pero más importante aún, para proteger los datos de sus clientes. 

3.2. Pequeñas empresas

Mucha gente tiene el pensamiento de que las empresas pequeñas no representan un objetivo atractivo para los diferentes grupos cibernéticos ilegales que existen, pero no es así.

Desde el punto de vista del negocio en sí, una empresa pequeña tiene como objetivo el crecimiento, y para lograr esto, este tipo de empresas hacen todos los esfuerzos posibles para poder generar relaciones comerciales con empresas grandes ya establecidas en el rubro particular de operación. Cuando estas empresas logran convertirse en socio de negocios es cuando las pequeñas empresas se convierten en un objetivo atractivo para los ataques cibernéticos debido a la relación de confianza establecida entre la empresa de gran tamaño y la pequeña empresa. Los diferentes grupos cibernéticos ilícitos toman ventaja de esta relación de confianza para poder atacar la pequeña empresa y esperar hasta confirmar el canal de intercambio de datos establecido entre las empresas para poder modificar el ataque a usar (worm payload) y realizar un movimiento lateral para poder trasladarse hacia la red de TI de la empresa de tamaño grande. 

Como se puede observar la Seguridad de la Información juega un papel titular en el intercambio de datos entre empresas del mismo sector y de sectores relacionados. Controles de Seguridad de la Información deben de ser implementados en ambas organizaciones, además de que las empresas de tamaño grande especialmente tienen que tener procesos de evaluación de Seguridad de la Información de Terceras empresas o de Socios de Negocios. 

Monday, April 24, 2023

The importance of Information Security in our lives – Part 2


 

2. In our shopping

According to an ECommerceNews study, there was an increase of 53% in Electronic Commerce [1].  This percentage not only is the reflect of the E-Commerce impulse had during the Covid-19 Pandemic, but it reflect Peruvians’ comfortable feelings towards making their shopping through the internet. 

Now, in that context, Information Security is represented by different factors, such:

    2.1. From the end user point of view

           a. Having their PC’s Operative System updated

           b. Having updated all software packages installed in the PC

           c. Have an updated anti-virus software package installed

    2.2. From the point of view of the E-Commerce Company service provider

           a. Have updated SSL Certificates

           b. Have a Vulnerability Management Program

           c. Have security controls to be able to protect the internet facing web site from external attacks (e.g. WAF, etc.)

           d. Have an information Security Team (internal or external) that could take control of the situation in the case of a cybersecurity attack

           e. Have secured backups of the Web application and critical data bases

           f. Have an industry standard certified network environment with PCI-DSS Specifications in case user credit cards are being used in the electronic transactions

           g. Being compliant with all local Information Security regulatory requirements 

References

[1] https://www.ecommercenews.pe/ecosistema-ecommerce/2022/al-cierre-del-2022-el-ecommerce-en-el-peru-movera-us-20-millones-y-crecera-53.html




Saturday, April 22, 2023

La importancia de la seguridad de la información en nuestras vidas – Parte 2

 

2. En nuestras compras

De acuerdo con el estudio de ECommerceNews,  el 2022 tuvo un aumento del 53% en el Comercio Electrónico [1]. Este porcentaje no solo es reflejo del impulso que tuvo el Comercio Electrónico durante la pandemia del Covid-19, pero refleja que los peruanos se sienten cada vez más cómodos en realizar sus compras por internet. 

Ahora bien, en este contexto, la Seguridad de la Información se ve representada por muchos factores, como:

    2.1. Desde el punto de vista del usuario

           a. Tener el Sistema Operativo actualizado
           b. Tener todos los paquetes de software que se usan frecuentemente actualizados
           c. Tener un antivirus actualizado

    2.2. Desde el punto de vista de la empresa proveedora del servicio de Comercio Electrónico

a. Contar con Certificados SSL

b. Tener un programa de Gestión de Vulnerabilidades

c. Tener controles de Seguridad para poder proteger la página web de ataques externos (por ejemplo: WAFs, etc.)

d. Tener un equipo de Seguridad de la Información (interno o externo) que pueda tomar el control en caso de un ataque cibernético

e. Tener sistemas de respaldo de datos de la aplicación Web y de Bases de datos críticas

f. Tener un entorno de red homologado con especificaciones PCI-DSS en caso se usen tarjetas de crédito de los usuarios para las transacciones electrónicas

g. Tener implementados los requerimientos relacionados con Seguridad de la Información provenientes del Regulador Gubernamental 

Referencias

[1] https://www.ecommercenews.pe/ecosistema-ecommerce/2022/al-cierre-del-2022-el-ecommerce-en-el-peru-movera-us-20-millones-y-crecera-53.html



Monday, April 10, 2023

The importance of Information Security in our lives – Part 1


Societies, including the Peruvian one, are adopting digital solutions not only at an enterprise level, but also in the personal. From the enterprise point of view, there are different digital solutions that when adopted not only become part of the available technology in the enterprise, but also they could be part of the specific niche’s regulatory requirement. This will require the enterprise to send periodic specific KPI (Key Performance Indicators) reports, which should be aligned with specific incident report times, especially when these are associated with service availability and information security.

In the personal case, there are a plethora of available of digital solutions, from food deliver, e-commerce, online banking, and a long etcetera. Due to the nature of the diverse application, it is necessary to register personal information (e.g.: names, last names, birth date, ID documents, etc.), payment methods (credit cards, debit cards, etc.), and other in our accounts. This fact of the account creations and personal data registration creates a trust relationship with the service provider, for which our data will reside in their data bases. These companies, as mentioned before, could be under regulatory requirements in their respective business niches, but this doesn’t mean they are 100% secure.

To better understand the different threats our data could suffer, I prepared a series of entries to share and hopefully, will create a Little of awareness about how to protect our date through simple processes. These are divided in seven parts y an additional one for conclusions.

  1. In our home

We all Heard of information viruses and how they can damage our computers, and/or how these could infect our computers, keep silent for a long period of time and extract specific information from our bank accounts, social media, email, etc. In this case information security, represented by an antivirus and updated Operative System (OS), could serve as a preventive measure against these types of attacks. 

In addition to the above, we should keep in mind that our digital identity has to be secured, in that sense; we should learn how to identify potentially malicious or illegal websites that are used to steal our identity and payment methods. 

See you in the second part.






Sunday, April 9, 2023

La importancia de la seguridad de la información en nuestras vidas - Parte 1


Las sociedades, incluida la peruana, están adoptando soluciones digitales no solo a nivel empresarial, pero también en el personal. Desde el punto de vista empresarial, existen diferentes soluciones digitales que al ser adoptadas pasan a ser no solo parte del abanico tecnológico de la empresa, sino que puede entrar dentro del ámbito normativo del regulador del nicho específico de negocio. Esto último requerirá que la empresa además de reportar periódicamente Indicadores clave de rendimiento (KPI por sus siglas en inglés) específicos, esté alineado con tiempos específicos de reporte de incidentes, especialmente cuando estos se tratan de disponibilidad de servicios y de seguridad de la información.

En el caso de uso personal, las soluciones digitales son mucho más variadas, desde entrega a domicilio de comida, comercio electrónico, banca en línea, y un largo etcétera. Debido a la naturaleza de las diversas aplicaciones, es necesario el registro de datos personales (como: nombres, apellidos, fecha y lugar de nacimiento, documentos de identificación, etc.), métodos de pago (tarjetas de crédito, tarjetas de débito, etc.), y demás en nuestras cuentas. Este hecho de la creación de la cuenta y el registro de datos, crea una relación de confianza con el proveedor del servicio, por el cual nuestros datos radican en sus bases de datos. Estas empresas, como se indicó anteriormente, pueden estar bajo la observación de los reguladores locales de sus respectivos nichos de negocio, pero esto no significa que estén 100% seguros.

Para poder entender un poco mejor los diferentes peligros que nuestros datos pueden sufrir, he preparado esta serie de entradas para poder compartir, y, ojalá, crear un poco de conciencia de cómo proteger nuestros datos mediante simples procesos. Estas estarán separadas en siete partes y una de conclusiones.

  1. En nuestro hogar
Todos hemos escuchado de los virus informáticos y de cómo estos pueden dañar nuestras computadoras, y/o como estos pueden infectar nuestras computadoras, permanecer silenciosos por un buen tiempo y después extraer información específica de nuestras cuentas bancarias, social media, correos electrónicos, etc. En este caso la seguridad de la información, representada por un antivirus y Sistema Operativo actualizado, puede servir como una medida preventiva ante este tipo de ataques.

Además de esto tenemos que tener en cuenta que nuestra identidad digital tiene que ser bien resguardada, en este sentido, debemos de aprender a identificar sitios web de dudosa procedencia o sitios web ilegales que son usados para robar nuestra identidad y métodos de pago.

Nos vemos en la segunda parte.




Monday, February 13, 2023

The lack of direction when it comes to Cybersecurity in Peru


 Peru is a country with a great diversity of natural resources, and strategically located, which makes a variety of professional paths available that graduates from the different secondary schools can choose to follow. Obviously, the decision to study a specific career depends not only on the applicant's skills, but also on the economic benefit that the career in question can provide in the future, the country's industry requirement for these professionals, etc.

In addition to the careers already established in the country, for example: medicine, law, various engineering, economics, etc., there are many careers that are destined for the future due to the greater use of technology in this era of the world, especially Information Technologies (IT). But IT, in its vast variety, has a discipline that is very important at the moment, but apparently in Peru only two higher education institutions in the leading sector are making efforts to create Peruvian professionals in this discipline, it is the Information Security, these are ESAN University (Master's level) and the National Engineering University (UNI for its acronym in Spanish) (Undergraduate level) [1, 2].

It is important to mention that Cybersecurity is a discipline in high demand around the world, due to many reasons, but basically due to the fact that a good part of the banking and commercial transactions that we do every day use electronic systems, either from the web or mobile phone [3]. This high demand discipline which is based on the constant use of the acquired knowledge, frequent updating, and an environment full of challenges, means that these professionals can work from Peru in other countries as well.Despite the fact that our country has been the victim of different computer attacks (including attacks against armed forces) in which personal data was illegally extracted, there is little or no interest from other educational institutions in properly creating this professional career, in addition It is more than disappointing that the Peruvian government, through its regulators of the different business areas, do not have clear and mandatory Cybersecurity regulations [4]. An additional factor is the little or no interest that private companies have in protecting consumer data, which significantly increases the risk of identity theft that consumers can suffer since there is no communication when companies suffer computer attacks with illegal data extraction.

It is this lack of awareness about the importance of Cybersecurity that not only makes educational institutions have no interest in creating these faculties, which will have negative consequences in the near future. Now, it is not only the fact of creating awareness in the governmental and private sphere, but also educating ordinary citizens that our digital identity is more than important in a world in which data will soon completely replace an identity in a printed card.

References:

  1. https://www.esan.edu.pe/conexion-esan/esan-graduate-school-of-business-presenta-la-maestria-en-gestion-de-la-ciberseguridad-y-privacidad
  2. https://rpp.pe/tecnologia/mas-tecnologia/uni-inaugura-carrera-de-ingenieria-de-ciberseguridad-noticia-1428538
  3. https://www.isc2.org/News-and-Events/Press-Room/Posts/2022/10/20/ISC2-Research-Reveals-the-Cybersecurity-Profession-Must-Grow-by-3-4-Mil-to-Close-Workforce-Gap#:~:text=Despite%20adding%20464%2C000%20more%20cybersecurity,not%20have%20enough%20cybersecurity%20employees.
  4. https://larepublica.pe/politica/gobierno/2022/10/08/hackers-en-la-dini-roban-secretos-militares-peruanos-de-ultimos-cinco-anos-guacamaya-leaks-ejercito-fuerzas-armadas
  5. https://rpp.pe/tecnologia/mas-tecnologia/peru-tercer-pais-mas-ciberatacado-en-america-latina-noticia-1359003






Monday, February 6, 2023

La falta de Norte cuando a Ciberseguridad se trata en Perú


Perú es un país de gran diversidad de recursos naturales, y ubicado estratégicamente, lo cual hace que se tenga disponible una variedad de caminos profesionales que los egresados de las diferentes organizaciones educativas de educación secundaria pueden optar por seguir. Obviamente, la decisión de estudiar una carrera específica no solo depende de las habilidades del postulante, sino también del beneficio económico que la carrera en mención pueda brindar en el futuro, el requerimiento de la industria del país de estos profesionales, etc. 

Además de las carreras ya establecidas en el país, por ejemplo: medicina, derecho, varias ingenierías, economía, etc., existen muchas carreras que son destinadas para el futuro debido al mayor uso de la tecnología en esta época del mundo, en especial Tecnologías de la Información (TI). Pero TI, en su vasta variedad, tiene una disciplina que es muy importante en este momento, pero al parecer en Perú solo dos instituciones educativas de nivel superior del sector líder están poniendo esfuerzos para poder crear profesionales peruanos en esta disciplina, se trata de la Seguridad de la Información, estas son la Universidad ESAN (Maestría) y la Universidad Nacional de Ingeniería (UNI) (Pre-grado) [1, 2]. 

Es importante indicar que la Ciberseguridad es una disciplina de alta demanda alrededor del mundo, esto por muchos motivos, pero básicamente por el hecho de que una buena parte de las transacciones bancarias y comerciales que hacemos día a día usan sistemas electrónicos, ya sea desde la web o en el teléfono móvil [3]. Esta alta demanda, basada en el uso constante del conocimiento adquirido, actualización frecuente, y ambiente llenos de retos, hace que estos profesionales puedan trabajar desde el Perú en otros países también.

A pesar de que nuestro país ha sido víctima de diferentes ataques informáticos (inclusive las fuerzas armadas fueron objetivos de estos) en los cuales datos personales fueron extraídos ilegalmente, existe un poco o nulo interés de otras instituciones educativas en crear debidamente esta carrera profesional, además es más que decepcionante que el gobierno peruano a través de sus reguladores de las diferentes áreas de negocios no tengan regulaciones de Ciberseguridad claras y de cumplimiento obligatorio [4]. Un factor adicional es el poco o nulo interés que las empresas privadas en proteger los datos del consumidor, lo que incrementa de manera significativa el riesgo de robo de identidad que los consumidores pueden sufrir ya que no hay ninguna comunicación cuando las empresas sufren ataques informáticos con extracción ilegal de datos. 

Es esta falta de conciencia acerca de la importancia de la Ciberseguridad que no solo hace que las instituciones educativas no tengan interés en crear estas facultades, lo cual tendrá negativas consecuencias en un futuro cercano. Ahora bien no solo es el hecho de crear conciencia en el ámbito gubernamental y privado, pero también educar al ciudadano de a pie que nuestra identidad digital es más que importante en un mundo en el que los datos pronto reemplazarán de manera completa a una identidad en una tarjeta impresa.

Referencias:

  1. https://www.esan.edu.pe/conexion-esan/esan-graduate-school-of-business-presenta-la-maestria-en-gestion-de-la-ciberseguridad-y-privacidad
  2. https://rpp.pe/tecnologia/mas-tecnologia/uni-inaugura-carrera-de-ingenieria-de-ciberseguridad-noticia-1428538
  3. https://www.isc2.org/News-and-Events/Press-Room/Posts/2022/10/20/ISC2-Research-Reveals-the-Cybersecurity-Profession-Must-Grow-by-3-4-Mil-to-Close-Workforce-Gap#:~:text=Despite%20adding%20464%2C000%20more%20cybersecurity,not%20have%20enough%20cybersecurity%20employees.
  4. https://larepublica.pe/politica/gobierno/2022/10/08/hackers-en-la-dini-roban-secretos-militares-peruanos-de-ultimos-cinco-anos-guacamaya-leaks-ejercito-fuerzas-armadas
  5. https://rpp.pe/tecnologia/mas-tecnologia/peru-tercer-pais-mas-ciberatacado-en-america-latina-noticia-1359003


Tuesday, June 7, 2022

Addressing the Cyber Security Insurance dilemma



Addressing the Cyber Security Insurance dilemma

Mainly due to the increase of ransomware attacks around the world during the last years, companies providing Cybersecurity Insurance or Cyber Risk Insurances are witnessing an increase in their products demand. 

Cisco defines Cybersecurity Insurance as: “Cyber insurance is an insurance product designed to help businesses hedge against the potentially devastating effects of cybercrimes such as malware, ransomware, distributed denial-of-service (DDoS) attacks, or any other method used to compromise a network and sensitive data. Also referred to as cyber risk insurance or cybersecurity insurance, these products are personalized to help a company mitigate specific risks.” [1]

Those organizations that are able to afford the cost of a specific Cybersecurity Insurance Policy need to understand that the Cybersecurity Insurance does not represent a holistic solution for any Cybersecurity attack they could be become victims of. 

In general terms, Cybersecurity Insurances should be a part of a well-structured Incident Response plan that organizes IT and non-IT departments across an organization including their respective senior or C-level management and aligned with a wider Business Continuity Program (BCP). While the complexity of the Incident Response Process is undeniably high, independently of the organization size, efforts should be made to have them in place and ready to go in the case of a severe attack against the organization’s IT infrastructure. Cybersecurity Insurances are the last resource in the established and practiced Incident Response Plan since it is designed to alleviate the cost of a successful attack and prevent the impacted organization to bankrupt [2]. In this regards, usual costs covered by the Cybersecurity Insurance are: investigation, crisis communication, legal services, and refund to customers [2].

Growing demand on Cybersecurity Insurances

Reportedly, ransomware attacks increased dramatically during 2021 and are still in the raise during 2022. Organizations impacted due to this type of attack are paying the ransom in order to reduce the time to obtain back their business related information, which triggers a different problem where organizations that decided to pay the ransom become again targets of a ransomware attack [3].

Moreover, the only problem is not only ransomware but the increased threat landscape due to the adoption of remote work due to the Covid 19 pandemic. Therefore, Security organizations around the world have witnessed an increase of complexity when it comes to their security strategies and the cost associated to those. 

Main function of the Cybersecurity Insurance

The main function of the Cybersecurity Insurance is to protect the organization of the cost associated with an attack that could have a considerable impact in the organizations operations. CSO indicates that “A Cyber insurance policy coverage usually includes costs related to the remediation process, such as paying for the investigation, crisis communication, legal services, and refunds to customers.” [2].

Having a Cyber Security Insurance could make me a target?

While there is no evidence that proves that malicious actors are able to obtain firsthand information of which organizations have acquired Cyber Security Insurances, there are some unscientific evidence that shows that malicious actors are more than ager to find ways to know which organizations have hired a Cyber Security Insurances and the Premium amounts of those.

Therefore, while hiring a Cyber Security Insurance could give C level executives some peace of mind, it should be accompanied by a solid security strategy and awareness.

Since Cyber Security Insurances could bring some level of last resources of protection to all size companies, it should not be understood as to have that in your Security Strategy as the only measure available against a Cyber Security attack.

Before even considering hiring Cyber Security insurance, organizations must create/review/improve their Incident Response Plans as mentioned in the beginning. Practicing that process in yearly internal drills is a good strategy to create muscle memory and be prepared when a real Security incident occurs. In addition of that, increases awareness and allow organizations to have their contact list updated. We will have more entries about Incident Response in the near future [8].

Conclusion

Cyber Security Insurances represent, if your organization is able to afford them, an additional layer where the organization could prevent bankruptcy as a consequence of a Cyber Security attack, but it should not be considered as the only available resource to handle a Cyber Security Incident.

Careful assessment is required in order to hire a Cyber Security Insurance, which might have some requirements in terms of Vulnerability Management, Security Controls, Security Operations, etc., in order to calculate the Premium.

References

[1] https://www.cisco.com/c/en/us/solutions/security/cyber-insurance/what-is-cyber-insurance.html 

[2] https://www.csoonline.com/article/3654216/is-cyber-insurance-an-invitation-to-cybercriminals.html#tk.rss_all

[3] https://www.techtarget.com/searchsecurity/news/252502519/Repeat-ransomware-attacks-hit-80-of-victims-who-paid-ransoms

[4] https://redcanary.com/blog/cyber-insurance/

[5] https://hbr.org/2021/01/cybersecurity-insurance-has-a-big-problem

[6] https://www.csoonline.com/article/3643054/cyber-insurance-explained.html#tk.rss_all

[7] https://www.darkreading.com/attacks-breaches/cyber-insurance-and-war-exclusions

[8] https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf


Saturday, July 4, 2020

ICS Attacks in Japan


ICS Attacks in Japan

Japan is well known internationally as a peaceful, well organized society where citizens obey the law and are compliant with rules across different governmental institutions. Spite of some internal problems like ageing society, sinking birthrate and now the economic consequences of the ongoing Covid-19 pandemic, Japan has done a great job into keeping its society under very traditional structures. Examples of how Japan is keeping parts of their society traditional is the banking system which continue using passbooks in order to allow the users to have records of their transactions, the existence of paper based processes in the governmental and private sector, the use of Hanko (a personal stamp used for personal/business/public documents), etc. In that traditional environment, the use of credit cards and other electronic payment methods have been introduced in the recent quinquennium without bumps in the road, like the loss of customer’s money to hackers from the Seven-Eleven Payment System 7Pay [1]. One of the factors that contribute to have such slow adoptions of electronic payment systems, for example, is the false sensation of security when it comes to transactions due to the image of safety society that Japan shows to the world [2].

It is also well known that Japanese organizations have been impacted due to different information security attacks during the last decade, being the ones that generated a great deal of media attention: the leaked of 12.6 million personal records in 2016, the previously mentioned 7Pay, etc. [3].

In addition to the dramatic increase in number of attacks due to the Covid-19 Pandemic, Japan has the same problem as other G7 countries, shortage of Cyber Security, which is projected to be around 193,000 professionals in 2020 and increasing due to Covid-19 is pushing companies to move their business online [4, 5, 6, 7].

With this increased in Security attacks, also attacks that are directed to Industrial Control Systems (ICS) have increased dramatically as well [8].  It is interesting to note that Japan has its own story of Security attacks against Industrial Control Systems (ICS), although not as abundant as US or Europe. The main officially reported incidents were (until 2017) [9]:

Year: 2005

Case Summary: Leak of atomic power plant’s confidential information via file sharing software.

Cause: Malware infection of an employee’s home PC storing confidential information.

Year: 2006

Case Summary: Leak of thermal power plant’s confidential information via file sharing software.

Cause: Malware infection of an employee’s home PC storing confidential information.

Recently, the attack against Honda’s factories indicates a new level of attack where the kinetic impact on the target was considerable [10]. IT related consequences of the attack payload were: employees were not able to use internal systems, inability to access servers, and inability to use email; while the kinetic impact of this attack was associated to halt operations in Honda’s factories located in Japan, UK, Turkey, USA and Italy [10, 11]. While there is no conclusions from the internal investigation on the attack, Honda had RDP accessible server facing the internet, which based on the analysis of Malwarebytes, there is clear evidence this could have been the attack vector used in order to compromise Honda’s IT infrastructure and cause economic losses as a potential collateral damage by the EKANS ransomware [12, 13].

Figure 1. Function responsible for performing DNS query [12]

Here are two important differences between the attack to Honda and the one to Enel:

While the ransom email is the same in both cases, here are two important differences between the attack to Honda and the one to Enel [12]:

Honda

Resolving internal domain: mds.honda.com

Exposed RDP: /AGL632956.jpn.mds.honda.com

Enel

Resolving internal domain: enelint.global

Exposed RDP: /IT000001429258.enelint.global

Interestingly enough, the same EKANS ransomware is also responsible for the attack against Edesur S.A., a company who belongs to Enel an Argentinian Electric Company, which could prove that Industrial Control Systems (ICS) became one of its main targets [12, 13, 14].

Additional screenshots of the RDP access to the specific Honda and ENEL publicly accessible servers can be found here: https://twitter.com/1ZRR4H/status/1270066266137559042?s=20

Conclusions:

  1. Japan false sensation of secured information (which comes from the false Japanese society’s sensation of security) needs to be updated in the near future in order to improve the methods and controls used to secure information across different organizations
  2. Attacks are increasing in general during the Covid-19 period, not only against company information but also against Industrial Control Systems (ICS)
  3. Reasons of the Honda and Enel attacks could vary from specific business purposes to attempts to disrupt normal operations in those specific targets
  4. Ransomware campaigns are still having great impact in organizations around the world, the more complex the organization is (with large number of assets) the more important is to have multi layer controls in place and a well-tested DR environment
  5. As the same as Stuxnet, EKANS is the newest member of a small family of highly targeted attacks against ICS infrastructure where specific entry points or payloads strategies are embedded in the malicious code
  6. EKANS differentiate itself from other ICS targeted attacks in using a more common entry points as RDP in order to deliver the malicious payload in the impacted machine/network
  7. The attack against Honda represents (based on officially reported information) the first large size ICS attack against a Japanese automaker
  8. Previous ICS related attacks against Japanese organizations were infections in company endpoints connected to user’s home internet connection
  9. Attacks originated in not secure home network environments against not-well managed or BYOD devices will increase due to ongoing Covid-19 Pandemic and the new Working from Home (WFH) company strategy
  10. Japanese organizations, of all sizes and business niches, need to see the opportunities available in their organizations to improve security methods and controls


References

[1] Another 7pay system defect left personal data of users exposed The Asahi Shimbun 

[2] Four firms with links to Japan's Defence Ministry hacked - The Straits Times

[3] 12.6 million cases of personal information leaked in Japan in 2016, survey shows - Japan Times

[4] What the Data Is Telling Us About the Current Rise in Security Threats During the COVID-19 Pandemic

[5] Cyber Security Talent Shortage in Japan - Accenture Security

[6] 71% of Security Pros See Threats Jump Since COVID-19 Outbreak - Dark Reading

[7] Addressing the Cyber Security Talent Gap - Dennis Ludena

[8] Critical infrastructure cyber attacks on the rise - EET Asia

[9] An Analysis of the Actual Status of Recent Cyberattacks on Critical Infrastructures, NEC, Matsuo Noguchi, and Hirofumi Ueda, NEC Security Research Laboratory, NEC Technical Journal, Vol. 2, 2017

[10] Honda's global operations hit by cyber-attack - BBC News

[11] ICS Threat Snake Ransomware Suspected in Honda Attack - Dark Reading

[12] Honda and Enel impacted by cyber attack suspected to be ransomware - Malwarebytes Labs

[13] EKANS Ransomware and ICS Operations - Dragos

[14] Edesur Argentina - Twitter

 



Sunday, November 17, 2019

Side effects of an ICS attack


Side effects of an ICS attack


Specific threats against Industrial Control Systems (ICS) Security are becoming more frequent in the Information Security scenario. There are many differences between standard IT Security and ICS Security, being the two most important the availability of the Control System in ICS, and the attack’s consequences, more on this in a future entry. Before getting in details, I would like to mention some of the most important sectors in the ICS spectrum: Energy, Nuclear, Communications, Emergency Services, Transportation Systems, and Water Systems [1]

From the point of view of availability, due to the nature of ICS in which products or processes are configure in a loop, where due to the continuous cycle, ICS devices can’t be stopped in order to mitigate risks or attacks in an ad-hoc basis. At the same time, consequences of successful attacks generate a different sense of urgency compared to the ones in IT due to the kinetic nature. In other words, when there is a data leaked case, people affected might receive a procedure from the affected company to apply a temporally solution changing passwords, settings, etc., but affected end users will not know exactly when or how their data could be used or the consequences of that misuse until it is already too late.

In the case of ICS Systems, their kinetic impact is instantaneous, targeted (possibly affecting the normal life development of a specific geographical region by attacking an Electric Plant and stopping the energy production) and it could last for weeks or months depending on the level of destruction the attack caused. In the worst case scenario, a successful attack against ICS infrastructure could cause the loss of lives.

As we can see, the kinetic impact is the most dangerous consequence of an attack against an ICS Infrastructure.

2019 Attacks analysis


Although the world, from the IT perspective is smaller than ever, the main targets of malicious actors are still being large corporations in industrialized nations. These malicious actors could be divided in five groups [2]:

1.      Nation State attackers
APT owners, have highly skilled resources and are capable of develop new threats
2.      Cyber Criminals
Individuals or groups that perform cyber-attacks to get financial benefit from it.
3.      Hacktivists
Individuals or groups that perform cyber-attacks on targets for political or ideological reasons
4.      Internal users
End users, system administrators, executives, etc.
5.      Partners
Defined as Companies that provide Services working together or by remote access with the client company.

These groups are usually focused on large targets, or as mentioned earlier, targets localized in industrialized countries, especially in the area of ICS where mayor players of Energy or Industry are located. Therefore, it is very interesting to see countries like Peru or Bolivia listed as main countries with the highest increase in the percentage of ICS computers on which malicious objects were blocked when removable media were connected to them, as shown in the following diagram:


Figure 1. Countries and territories with the highest increase in the percentage of ICS computers on which malicious objects were blocked when removable media were connected [3, 4].

Although statistics are focused on computers used in the ICS environment, the increment of blocked malicious objects blocked is a clear indication that ICS attacks could happen in the near future, either because a compromised PC is connected to an ICS device directly or that the malware is designed to use the PC infrastructure as a bridge to identify and compromise ICS devices.

The reason behind that assumption is that although Antivirus (AVs) could be found in enterprise environments in South American countries, AVs are only able to detect commodity malware, in other words, historical malware, leaving the door open to more advanced ICS Security threats.
Implementation of more advanced or multi-layered security controls, especially for ICS in countries like Bolivia or Peru is usually a difficult topic to discuss in any company size, due primarily to the cost associated to these products, in addition to this is the lack of understanding how Security works from the knowledge cycle point of view where additional investment is required in internal and external training.

Bolivia, and Peru, why?


There are many reasons for attackers, mainly Cyber Criminals and Hacktivists, could be interested into attacking ICS infrastructure in Bolivia and Peru, here I present you some of them:

1.      Economy dependency
Countries like Peru and Bolivia, as well as other South American countries, because one of the biggest economic activities are the extraction and export of Natural resources, for example Peru has important cooper and gold mines that provide those minerals to countries like China, Japan, US, etc., generating a good percentage of the country’s annual budget and supporting the ability of the government to improve living conditions of their citizens. Having an impact on that money making engine will have a significant impact to the country’s economy and therefore to their citizens.

In this case Cyber Criminals and Hacktivists might be hired to do the job by the real organization interested into causing negative effects to these countries’ economies.

2.      Side effect in another economies
Having a large impact in raw material providers’ countries like Peru and Bolivia could impact their final customers, like China, Japan, US, etc., not allowing them to continue normal operations in their factories which could slow down, or halt them if the ICS attack caused a major impact in the infrastructure, causing a different impact on their economies.

In this case, as the same as the previous one, Cyber Criminals and Hacktivists might be hired to do the job by the real organization interested into causing negative effects in the main customers of these countries’ production. In this particular case, Nation State Attackers could be part of the attacking strategy.

3.      Disgruntled workers
This is a common conversation in IT Security, but not so common in ICS Security due that, because of the nature of the network, it is sometimes difficult to identify the unhappy worker. Still, necessary measures should be consider, like the use of CCTV cameras in key points of the plant, or additional Safety infrastructure and controls enforced among all resource levels in the organizations.

Solutions available


As explained before, companies in either Peru or Bolivia don’t have the conversation and/or don’t have the required budget to invest, assuming those specific issues, here are some solutions available:

  1. Have an honest discussion about IT Security with the people in your company and management. The reason behind mentioning IT Security is because is the front door of any ICS related attack.
  2. Ask your IT Security people to make a Risk Assessment and define the critical infrastructure or systems from the IT point of view.
  3. Make an assessment of the condition of the ICS network used in the company, things like: years of operation and life expectancy, upgradability, segmentation between the ICS Network and the IT Network, management requirements, etc.
  4. Collect all the results of your ICS Assessment and make a Risk Assessment of your ICS infrastructure, different methods are available for this purpose (NIST 800-82, North American Electrical Reliability Council (NERC), Cyber Security Evaluation Tool or CSET, Electricity Subsector Cybersecurity Risk Management Process, etc.) decide the one most suitable for you and apply it, the results should be your critical infrastructure or Systems [5, 6, 7, 8].
  5. With the Risk Assessment results, have a conversation with your IT Security people, ICS people and cross reference the two results (IT and ICS) of their correspondent Risk Assessments. The result should be the most important points to protect.
  6. Define the required strategy from the IT Security point of view to protect those important points, the resource required and the budget associated.
  7. Check, and create if required, all policies according to local/international regulators and company specific regulations.
  8. It is always a good idea to contact the ICS manufacturers and IT Security systems companies to create POCs. Results of the System POC should show the system effectiveness to apply Company’s policies, and its effectiveness to mitigate discovered risks.
  9. Map the POC results with the available budget. This could give Management an idea to make the final decision to buy, implement, rent or outsource the given system

To spend or not to spend, there is the dilemma


One useful factor to decide an expense in a company is the cost associated with a breach. Although in the case of an ICS attack the breach negative impact of the information disclosed is smaller compared to the real kinetic impact, it is still useful to explain to management how reputation and normal operations in a company could be affected, and how could be difficult to recover from it [9].

Having the IT and ICS team working together on the results of the combined Risk Assessment could provide a valuable assessment on the cost associated with a breach and depending of the nature of the business of the company a much detailed cost could be calculated. Obviously, if there is the slightest probability that an attack against the company could result in the loss of lives, the cost associated could go beyond the company value, and definitely no amount of money could be enough for the families that could be affected because of that loss of live.

Being said that, there are solutions for every pocket and they can be either paid ones or open source ones, each one with their own drawbacks, more on this in a future post. The biggest drawback associated with the paid ones is the budget required, not only for the solution but, even more important, for the training required for the resources that will interact with the solution. Always remember that People are the most fundamental part of your People Process and Technology (PPT).

As for the Open Source solutions, although the cost associated with them is not that big, usually the hardware used in the solution is the largest cost associated; the knowledge cost associated is the biggest impact in the company’s budget. Having an in-house expert of an Open Source solution could be costly, moreover debugging and administrating an Open Source solution could not be always straightforward, especially in an ICS environment, where availability is king.

Now, depending on company’s structures, your IT Team could be outsourced as well as the company in charge of the ICS devices’ maintenance, or in the case that there is no expertise to rely on when making the different risk assessments and having the necessary discussions, or when your Senior Management wants a third set of eyes to oversee the process (which is not a bad idea after all), in those cases, an additional cost could be the hiring of a consulting company to provide the expertise and solution. Depending on the task in hands and the company to be hired, this cost could represent a significant amount of budget, therefore, be careful if you go this route, check as much as you can all the references and information about the consulting organization.

Conclusion


Although is interesting to see countries like Bolivia and Peru in the list of countries affected by ICS attacks, ICS companies in general should have Security as one of their priority tasks, moreover if an attack could potentially have a kinetic impact represented by loss of lives.
Risk assessments, from the IT and ICS point of view, are required and should be cross referenced and analyzed as a group by both IT and ICS teams.

Spending is always an issue, but necessary to avoid unwilling negative consequences, or negative impact, and to act proactively against any possible ICS attack.

References
[1] Critical Infrastructure Sectors, Department of Homeland Security, US -  https://www.dhs.gov/cisa/critical-infrastructure-sectors
[2] Creating a Threat Profile in your organization, SANS - https://www.sans.org/reading-room/whitepapers/threats/creating-threat-profile-organization-35492
[3] Threat landscape for industrial automation systems, H1 2019, Kaspersky - https://ics-cert.kaspersky.com/reports/2019/09/30/threat-landscape-for-industrial-automation-systems-h1-2019
[4] Infographic – ICS/OT Cyber Attacks, Galactic Security Systems - https://www.galacticsecurity.systems/
[5] Guide to Industrial Control Systems (ICS) Security, NIST - https://csrc.nist.gov/publications/detail/sp/800-82/rev-2/final
[6] North American Electric Reliability Corporation (NERC) - https://www.nerc.com/Pages/default.aspx
[7] Industrial Control Systems Assessment, CISA - https://www.us-cert.gov/ics/Assessments
[8] Electricity Subsector Cybersecurity Risk Management Process, U.S. Department of Energy - https://www.energy.gov/sites/prod/files/Cybersecurity%20Risk%20Management%20Process%20Guideline%20-%20Final%20-%20May%202012.pdf
[9] The State Of Industrial Cybersecurity 2018 - https://ics.kaspersky.com/media/2018-Kaspersky-ICS-Whitepaper.pdf


Monday, September 23, 2019

Securing organizations in large scale events



Securing organizations in large scale events

This year Japan is the host of multiple large scale sport events, the 2019 Rugby World Cup and the 2019 Volleyball World Cup, both nationwide events that will attract a significant number of fans to different cities across Japan [1, 2].

To have an idea of the magnitude of the 2019 Rugby World Cup in Japan, approximately 400 000 fans will arrive to Japan for the different matches from September 20. Online activity will have a drastic increase in Japan as well having as a reference the 2015 World Cup where over 270 million social media videos were viewed, 2.8 million official app downloads, and the hashtag #RWC2015 appeared twice a second [3].

It is predicted that the online activity in Japan will be larger than the last World Cup; moreover, Japan is in the top 10 countries with the fastest internet connection, which allows travelers and locals to exchange a vast amount of information.

Fans cheer up your team and secure your devices!

In this scenario, fans (local and travelers) should exercise standard security measures in order to protect their information, like:

  1. VPN use when connecting through publicly available Wi-Fi spots
  2. Having patched and updated all your Oss, laptops and phones
  3. As a general measure, not only for these events, users should act with caution when receiving mails with attachments and follow simple rules to avoid phishing mails [4]
  4. Download apps from trusted sources (Apple store or Google Play)
  5. Only visit sites that have https enabled [5]

Securing IoT

The Japanese government began to scan any device that is accessible through the internet, especially IoT devices, as part of their initiative to identify devices that can be victims of brute force attacks, meaning that they are still using easy-to-guess passwords or factory default passwords. Once a vulnerable device is found, the Internet Service Provider (ISP) will be contacted in order to establish communication with the end user [9, 10].

Therefore, fans, if you haven’t updated your device’s passwords, it’s time to do it. Don’t wait until you receive a notification from the company you used to get internet access in Japan.

Securing organizations in Japan

Organizations, especially the ones who have a close relationship with any event, like sponsors for example, could become target of different types of attack from various groups of attackers.

Attackers groups could vary from people trying to learn more about Security and unwillingly cause some damage to a company infrastructure, groups of people that they have different interests like: financial, political, religious, etc., that could have much more advanced tools at their disposal to launch attacks to specific organizations’ infrastructure, and of course we have Nation State attackers who belong to different Advanced Persistent Threats (APTs) grouped according to the targets they have and the tools they commonly use [6].

Although Security Professionals we cannot precisely forecast when an attack could occur, we can continuously assess the efficiency and reliability of our set of tools. There are some steps to follow in order to efficiently test the reliability of our own tools, this is a simple guide but you can make it much more detailed if required.

Understand the company lifecycle

Having a clear idea of where are the crown jewels of your organization, where the revenue is coming from, prioritized assets, Intellectual Property (IP), internal systems that support the organization is the first and foremost important step to create the scenarios together with the full understanding of the impact on the impact if one of your priority infrastructure is compromise.

a. Collect information

The Mitre ATT&CK framework is a collection of Tactics, Techniques and Procedures (TPPs) used by different attackers groups. This information is crucial to know what to test in our security systems.

Please remember that although this is a collection of all TPPs, specific groups like APT, have their own favorite set of TPPs, there is no “magic” blueprint that can be used to generalize attacks from different groups.

An additional important set of data is the threat lifecycle, also known as kill chain model, there are many variants of this, but we can use the follow high-level steps [6]:

  1. Reconnaissance
  2. Weaponization
  3. Delivery
  4. Exploitation
  5. Installation
  6. Command & Control
  7. Actions and objectives

b. Create scenarios

Together with the use of Frameworks like Mitre’s ATT&CK, detailed scenarios can be created according to the organization’s specific requirements [7].

Scenarios like controls against Phishing mail are common and well understood. More complex scenarios can be created but depends on your organization’s requirements.
Once the most relevant attack scenarios are ready is time to test them, a table top exercise could be used to understand not only the tool efficiency but also the process around them that are required in any organization independently of their size and nature.
Gaps resultants from the test are required to be discussed and remediated, then tested again and the cycle continues.

c. Special circumstances

In this moment Japanese organizations are, one way or another and in different levels, involved in the Rugby World Cup and Volleyball World Cup, especially sponsors, governmental organizations, partners, etc.

Those highly involved organizations need to put additional attention into the Security Landscape, if possible, adding Threat Intelligence to their normal security operations could improve their vantage point incrementing the resilience capacity of their installed tools.
Education for end users is, as always, the most one of the most important strategies available in any organization to improve their security posture. Constant training, simulations and exercises are a must for any organization to improve their preparedness for any potential security attack.

Conclusion

As a conclusion, organizations involved in big ticket events in Japan need to improve their security posture through testing, user’s training, focused threat intelligence and process improvement. Specially, when the Enthronement Ceremony for the new Emperor will happen on October 22 generating interest from a different group of attackers than the ones interested in sports [8].

Let's remember this is a rehearsal for the 2020 Tokyo Olympics.


References

[1] https://www.rugbyworldcup.com/
[2] http://worldcup.2019.fivb.com/en
[3] https://www.techradar.com/uk/news/tackling-cybersecurity-at-the-rugby-world-cup
[4] https://www.pandasecurity.com/mediacenter/security/10-tips-prevent-phishing-attacks/
[5] https://www.digicert.com/blog/buy-site-know-website-secure/
[6] https://www.sans.org/security-awareness-training/blog/applying-security-awareness-cyber-kill-chain
[7] https://attack.mitre.org/
[8] https://en.wikipedia.org/wiki/2019_Japanese_imperial_transition
[9] https://dennisludena.blogspot.com/2019/02/japanese-government-to-probe-insecure.html
[10] https://dennisludena.blogspot.com/2019/02/japanese-government-to-probe-insecure_26.html

The importance of Information Security in our lives – Part 6

  6. In our relaxing time In these moments even our relaxing time is related to the use of a PC or to an streaming service, we should be mor...