Asleep Though We Stand In The Midst Of A War

What do we do when we discover a storm brewing in the Atlantic that becomes a tropical depression that is heading toward the East Coast?

We prepare.

Cybersecurity experts have been tracking just such a storm that has been brewing in cyberspace for the past several weeks and they expect it to hit a million organizations worldwide. And as its predecessor, Mirai did almost exactly a year ago this month, it is expected to take down vast portions of the internet and perhaps even dwarf that historic cyber-hurricane which tackled major websites on the Atlantic Coast, and crippled a huge part of the internet’s backbone.

Are we prepared? Of course not.

This hurricane, which has been named Reaper (as in grim) was first detected in September and trackers say it is growing by 10,000 devices per day. And like its predecessor it is infecting cameras and routers and other IoT devices which typically have weak security controls in place. Following the last storm, we were told to make sure that all of all of our internet-connected devices, especially our home routers were up to date with the latest firmware upgrades and security patches. I will bet the mortgage that no one did any of that.

As the Governor of Minnesota, Mark Dayton told a gathering of Cybersecurity experts in Minneapolis this week, “I fear that it will take something truly catastrophic to gain the public’s attention,” I am pretty sure he’s right about that, but unlike a physical hurricane that comes and goes in a few days leaving a mess behind that can be cleaned up fairly quickly, a cyber-storm like the Reaper has the potential to leave a lasting impression on the landscape, one that none of us will want to imagine.

A Reaper-class cyber-storm can shut down the entire U.S. critical infrastructure. It can destroy industrial controls for equipment we rely on to manage energy, water, communication, transportation, and agriculture just for starters. These operational systems will not be returned to any sort of normal on-line status when and if the storm passes and repairing some of the major components will be difficult and in some cases impossible.

Most of our power generator components for example are made in Europe and China and since we do not have a backup supply on hand, they will have to be built and then transported to the locations where the outages have occurred. Many of these are of the size and weight that challenges overland transportation and in some cases it will simply be impossible to get them where they are needed. The lead times for a new build can be a year or more.

This new storm is now spreading across the United States, Australia and other parts of the globe, and many trackers are concluding that the purpose is to test systems and create global chaos while sending a message that hurricanes like this one are a precursor of things to come. Not unlike analogous kinetic storms in physical space, we will be unable to halt this or the ones that follow given the state of our Cybersecurity readiness. If I were planning on shutting down all of the energy systems in a target country, I would pick the beginning of winter as a good time to start. Oh …

Now you would think that this sort of impending doom would be sufficient to motivate members of congress to craft some emergency legislation that addresses all of the vulnerabilities with specific plans to prepare and recover, but no matter how hard or deep you dig, you will find nothing of the sort.

What then will it take? We had a very minor bot attack last October when Mirai assembled over 100,000 bots and attacked the Dyn domain name system (DNS) infrastructure with a large distributed denial-of-service (DDoS) attack. The result was that the Internet was unavailable to most people in the U.S for the better part of a day. What happens when the next attack assembles 100,000,000 bots and invades all of the cameras, televisions, home routers and other vulnerable IoT devices connected on the Internet while conducting a serious and widespread DDoS attack?

That small attack last October did however succeed in opening up an important conversation about internet security and volatility. Not only did it highlight vulnerabilities in the security of IoT devices that need to be addressed, but it has also sparked further dialogue in the internet infrastructure community about the future of the internet itself.

That is all good, but the Internet infrastructure community is not the right place to be talking about this.

Our leaders in congress and the administration are the only people who have the power to effect change and to enforce the requirements for upgrading our operational industrial control systems throughout our entire critical infrastructure. The responsibility to prevent a Cyber-attack and protect our nation’s infrastructure rests squarely on their shoulders and it is well past the witching hour.

We need a joint task force led by the private sector to immediately formulate and implement a defense system to not only prevent an attack of this nature, but to develop an offensive that can take the fight to the enemy. This is not that hard. Where is congress when their collective voices are actually in demand?

Four in ten millennials don’t know that Equifax was hacked and seven in ten don’t understand how the Equifax hack affects them. It seems we have finally arrived at peak stupid.

Asleep, though we stand in the midst of a war … Gotta get mine … Gotta get more – Township Rebellion, Rage Against The Machine.

The post Asleep Though We Stand In The Midst Of A War appeared first on Netswitch Technology Management.

*** This is a Security Bloggers Network syndicated blog from News and Views – Netswitch Technology Management authored by Steve King. Read the original post at: https://www.netswitch.net/asleep-though-stand-midst-war/

One thought on “Asleep Though We Stand In The Midst Of A War

  • October 30, 2017 at 6:46 am
    Permalink

    I think whole internet is the nasty place. Where you never who is looking for you? what are their intentions? So for that we need to secure our self by our own . For this we need to stop sharing our personal details specially on social media. While browsing we need to stop clicking on irrelevant posts.

Comments are closed.