Wednesday, December 3, 2014

Was Sony the Victim of an Activist Attack

Last Thursday, Thanksgiving in the US, details of an extremely damaging hack into Sony Pictures began to spread across the web.

The latest reports indicate that Sony's internal communications were knocked offline and all the internal files of Sony were taken and are now readily available on the web. One report states that the data stolen totals in the terabytes.

Putting aside how it happened and why such an attack/exfiltration of data was not seen and stop, the Sony hack is being reported as unique and a "cyber landscape game changer."

The reason for these claims is that purportedly the hack was state sponsored by the North Koreans. Even more unique is the motivation. The attack is in response to a movie Sony has produced, a comedy about killing the Premier of North Korea. (Again let’s put aside the decision to make such a movie.)

In essence, the North Koreans are upset because a company has decided to poke fun at its leader. Their ire has manifested itself in an attack to steal all the companies’ secrets and lay them bare to the public for inspection.

As I stated, a number of cyber security pundits are calling this unique and game changing and a new chapter in cyber-attacks. Nevertheless, they are wrong.

For years, I and several others in the information security/cyber world have been pointing out the 4 true cyber threats:

  • Crime- focus is profit
  • Espionage- focus is information theft
  • Warfare- focus is destruction of system
  • Activism- focus is to embarrass or discredit

Of the four, the last, Activism, is the scariest because of the motivation. The attacks are intended to "lay bare" a company's, government's or person's secrets. Once this data is made public, the other cyber underground actors can then use it for their purposes, namely Crime, Espionage and/or Warfare.

The attack on Sony is no different than the attack on JP Morgan or any of the "Ops" launched by Anonymous. The intention is the same. The attackers want the information to force a change and are willing to go public with it to effectuate the change. "To Hell" with all the others hurt by the attack, who identities and credentials are now in the public domain or whose businesses will go under because the victim can no longer operate as normal. For the attacker, those companies never should have started working with such corrupt businesses, like Sony. Because making a bad comedy about Kim Jong un, the Megalomaniac Dictator with horrible hair, makes you corrupt.

My point is that the reason for attacks is not always what we assume. The motivation of attackers is equally if not more important than the methodology of the attack. (In the Sony case, Ill bet it turns out to be a phishing attack where malware was installed by someone with admin access to their computer and from there a version of Shamoon was installed to infect the network. Thanksgiving was the targeted launch date because it would generate the most press and potentially the most damage if the virus ran its course over the 4-day weekend, but that is just a guess.)

Companies need to understand what data they hold and how valuable it is. It’s not always about credit card or financial data.

How many deals, operations, projects have fallen apart because of leaks of information? How many will fall apart because of the Sony hack?

Stop waiting for the attack and take proactive steps to secure your company.

Sony's hack will cost upwards of $400 million by the time it’s done, all totaled. If only they had spent 1% of that on a proactive review.

One parting thought, I asked this before but Ill share it again. If you run a business, sit on a board or are in management in any way you need to be able to answer these ten questions:

  1. Who specifically is responsible for information security within your company and your supply chain?
  2. What company data is the most valuable, who has access to it and why?
  3. Who decides who has access to what information stored within your company?
  4. Can you see what is coming into AND out of your system?
  5. Do you have a cyber-incident response, management, remediation and resiliency plan?
  6. Does your company have a threat awareness program for employees, management and day-to-day operations?
  7. Who is responsible for monitoring social media and the internet for threats and attack information?
  8. When was the last cyber security audit conducted, by whom and where is the report?
  9. Do you do Information Security Due Diligence on your suppliers?
  10. Does anyone in your security team think like a bad guy?