Skip to main content

FUD

This paper
A short summary of this paper
0 Full PDFs related to this paper

FUD

EDPACS The EDP Audit, Control, and Security Newsletter ISSN: 0736-6981 (Print) 1936-1009 (Online) Journal homepage: http://www.tandfonline.com/loi/uedp20 Mitigating Cybercrime Through Meaningful Measurement Methodologies Davey Winder & Ian Trump To cite this article: Davey Winder & Ian Trump (2015) Mitigating Cybercrime Through Meaningful Measurement Methodologies, EDPACS, 52:5, 1-8, DOI: 10.1080/07366981.2015.1113058 To link to this article: http://dx.doi.org/10.1080/07366981.2015.1113058 Published online: 21 Dec 2015. Submit your article to this journal View related articles View Crossmark data Full Terms & Conditions of access and use can be found at http://www.tandfonline.com/action/journalInformation?journalCode=uedp20 Download by: [62.255.165.58] Date: 22 December 2015, At: 04:04 THE EDP AUDIT, EDPACS CONTROL, AND SECURITY NEWSLETTER 2016 VOL. 52, NO. 5 MITIGATING CYBERCRIME THROUGH MEANINGFUL MEASUREMENT METHODOLOGIES DAVEY WINDER AND IAN TRUMP Downloaded by [62.255.165.58] at 04:04 22 December 2015 Abstract. Fear, Uncertainty and Doubt (FUD) has become a staple in the cyber-attack measurement and reporting diet. Be it sensationalist and hyperbole-filled language, or the lack of any meaningful and consistent measurement methodology, the end result is the same: zero clarity concerning an already complex subject matter that serves to continue rather than counter the cyber-crime threat. The public discussion (via media reports) and business insight (through myriad methodologies of mis-measurement) need to be better framed if we are to truly confront the growing problem of cyber-crime. Who the criminals were is of less import than how they got in; compromise indicators are more valuable to other businesses than the financial cost to that particular victim. The measurement metric dial has moved too far towards attribution and needs to be reset to prevention and a business-based analysis of risk once more. The data upon which threat intelligence and attack surface trend analysis resources are based must become more granular if it is to be more relevant across all business sectors. If we continue to go down the road of IN THIS ISSUE never disclosing or identifying the security components that failed or the components that were not in place when a breach happened, we will never n Mitigating Cybercrime make any progress against an elusive enemy. Through Meaningful Fredrick the Great of Prussia said it best when he declared, “he who Measurement defends everything, defends nothing”. We need data on how to defend and Methodologies this is only derived from an open sharing of relevant and accurate attack n Reducing Identity Theft information without fear of punitive litigation. Using One-Time Passwords and SMS Fear, Uncertainty, and Doubt, or FUD as it is better known, has sadly become something of a staple in the cyberattack measure- ment and reporting diet. Be it sensationalist and hyperbole-filled Editor DAN SWANSON language or the lack of any meaningful and consistent measure- ment methodology, the end result is the same: a lack of clarity Editor Emeritus concerning an already complex subject that serves to continue BELDEN MENKUS, CISA rather than counter the cybercrime threat. Both the public discus- sion, via media reports, and the business insight through myriad methodologies of measurement, need to be better framed if we as CELEBRATING OVER 4 DECADES OF PUBLICATION! E D P A C S 2015 an industry are to truly confront the growing and increasingly expensive problem of cybercrime. Clearly defining cybercrime has to be a pre-requisite to mean- ingful measurement; you cannot count something if you are not sure what it is you are counting to begin with. This is the approach taken by both the United Kingdom’s Home Office, and the Office for National Statistics, which would appear to look for a separation of cyber-enabled crime and cyber-depen- dent crime in order to facilitate accurate reporting of cybercrime per se. While there are reasons for taking this approach in order to produce statistical reports, mainly to do with separating tradi- tional crime from the “new” cybercrimes, ultimately it’s neither accurate nor helpful when it comes to understanding the true scale of the problem or how to tackle it. Why so? Well, cyber-dependent crimes are defined as those that exist because of the technology concerned, while cyber-enabled ones are existing offenses that can be assisted by it. Hacking, malware, and Distributed Denial of Service (DDoS) attacks would Downloaded by [62.255.165.58] at 04:04 22 December 2015 all fall into the cyber-dependant group under this definition, whereas sexual offenses and fraud would be seen as cyber- enabled because the offenses pre-date the technology being used to commit them. Yet these examples themselves throw up an obvious problem: what about those crimes that are neither clearly one nor the other, but rather both? WHY THE “COST PER RECORD” METRIC IS DOOMED TO FAIL “… the real eye-opening numbers are around data breach costs to an affected enterprise or SMB, the first time Verizon has ventured into putting a solid number on the cost of a breach. ‘People have for years tried to get us to talk about the impact of breaches, but we just haven’t had the data,’ said Jay Jacobs, a Verizon data scientist and one of the report [Verizon Data Breach Intelligence Report 2015] co-authors. Jacobs said one partner, Net Diligence, contributed cyberliability insurance claim data from its partner network of cyber insurance carriers. “This is what people are claiming they lost; it’s a very objective data set to work with.” “The data set of 191 claims with loss of payment card informa- tion, customer personal information and medical records was the If you have information of interest to EDPACS, contact Dan Swanson (dswanson_2008@yahoo.ca). EDPACS (Print ISSN 0736-6981/Online ISSN 1936-1009) is published monthly by Taylor & Francis Group, LLC., 530 Walnut Street, Suite 850, Philadelphia, PA 19106. Subscription rates: US$407/£247/€327. Printed in USA. Copyright 2015. EDPACS is a registered trademark owned by Taylor & Francis Group, LLC. All rights reserved. No part of this newsletter may be reproduced in any form — by microfilm, xerography, or otherwise — or incorporated into any information retrieval system without the written permission of the copyright owner. Requests to publish material or to incorporate material into computerized databases or any other electronic form, or for other than individual or internal distribution, should be addressed to Editorial Services, 530 Walnut Street, Suite 850, Philadelphia, PA 19106. All rights, including translation into other languages, reserved by the publisher in the U.S., Great Britain, Mexico, and all countries participating in the International Copyright Convention and the Pan American Copyright Convention. Authorization to photocopy items for internal or personal use, or the personal or internal use of specific clients may be granted by Taylor & Francis, provided that $20.00 per article photocopied is paid directly to Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923 USA. The fee code for users of the Transactional Reporting Service is ISSN 0736-6981/06/$20.00 + $0.00. The fee is subject to change without notice. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Product or corporate names may be trademarks or registered trademarks, and are only used for identification and explanation, without intent to infringe. POSTMASTER: Send address change to EDPACS, Taylor & Francis Group, LLC., 530 Walnut Street, Suite 850, Philadelphia, PA 19106. 2 ª 2015 LogicNow Ltd. All rights reserved. 2015 E D P A C S basis for a fresh look at data breach cost impact. The result was a string of new conclusions that cast doubt onto older models that derive a cost-per-record by dividing the sum of loss estimates by the total number of records lost. “The annual Ponemon Institute Cost of a Data Breach study, for example, puts that number at $201 per lost record in 2014. Applying that same formula to Verizon’s numbers of $400 million in estimated losses divided by 700 million compromised records puts the cost-per-record at 58 cents”1 DEFINING CYBERCRIME Blackmail is an “old” offense, yet DDoS attacks (the majority of which clearly have blackmail at their core) are seen as new crimes? Similarly, when does fraudulent intent jump the boundary from old to new? Attempts to over-define cybercrime actually make matters worse, not better, by introducing confusion rather than producing clarity. If you think about it, cybercriminals are doing nothing Downloaded by [62.255.165.58] at 04:04 22 December 2015 more than emulating their crime forefathers who would threaten a “physical” business with extortion or theft, fraud, or vandalism. The evolutionary move has taken these criminal acts and digi- tized them, enabling the criminal to conduct an electronic attack across the Internet, often originating from countries with a ques- tionable rule of law shall we say, which serve to inflict the same levels of damage or monetary gain as the local organized crime gangs of old. The truth is that the Internet quite simply provides criminals with an almost unlimited reach when it comes to the victimization of target businesses and organizations. Extortion has evolved to include the holding of data (as evi- denced by attacks such as CryptoLocker malware) or an entire online operation (as evidenced by a DDoS attack) to ransom. Theft is no longer a physical smash and grab of physical goods, but extends to the intellectual property of a business, along with any kind of account information that can lead the criminal to further potential monetary gain. Fraud is fraud; however, it is conducted, and in cyber terms that can mean man-in-the-middle attacks and social engineering to facilitate bank, point of sale, or ecommerce fraud. And finally, vandalism may be tied into politics through DDoS attacks against Internet connectivity or defacement of Web-based property itself. COMPARING ORANGES WITH APPLES Start compartmentalizing cybercrime from the measurement per- spective, and very quickly the difficulties of comparing oranges with apples becomes apparent. Indeed, attempting such a com- parative exercise is fraught with peril and serves to highlight where we, as an industry, are getting our metrics wrong. The accepted cost per record metric when dealing with a breach, for example, is far too broad a sweeping brush to be of any real-world use. Look at how this works in practice: a breach occurs and the number of records at risk of access from the compromised database is then multiplied by a “cost per record” factor taken from a source ª 2015 LogicNow Ltd. All rights reserved. 3 E D P A C S 2015 such as, for example, the Verizon Data Breach Report, which is used to produce the estimated overall loss to the business figure. Immediately it is clear that this measurement of cost to the business of the breach is dependent on which source was chosen to provide the multiplier. What is less immediately obvious is that the real cost to the business is also dependent on far too many external factors, which are often unknown until much further down the post-attack time line. Such things as the cost of forensi- cally investigating the breach, restoring business operations, repairing reputational damage, and paying the costs associated with potential subsequent lawsuits. By way of example, look at the case of the RSA attack2 where the algorithm for tokens was most likely stolen by Chinese nation-state hackers; how can you possibly hope to accurately determine the per record cost? A single stolen record that leads to the looting of the Predator Drone Program, Reaper Drone Program, and F-35 Lightning Program, including the Internet Protocol (IP) design blue prints, and in turn sees a Chinese prototype rolled out 18 months Downloaded by [62.255.165.58] at 04:04 22 December 2015 later changes everything. WHAT WAS THAT COST PER RECORD AGAIN? At best, any cost per record estimate is going to be so broad as to be pointless; at worst it is going to be misleading and could impact on the business recovery operation. To put it mildly, deriving a meaningful generic cost per record is all but impossible as the type of record, data breach scenario, and litigation potential varies so considerably. Start trying to compare this to a DDoS attack, where the metric is most commonly that of the amount of traffic per second used to perpetuate the attack, and we enter an entirely new level of statistical obfuscation. How can you determine an economic baseline value from a DDoS attack? Connectivity costs may well be a constant, but the value and protection of the business Internet connection may vary substantially dependent on how much the connection under attack is relied on to provide core business services. In both these cases, where the metrics commonly used and com- monly reported on are open to media influenced fluctuation (head- lines attract readers, sensational headline attract sensational numbers of readers) the temptation to over-egg the impact measure- ment pudding can be all too great. When you consider that the recipe for that pudding more often than not comes from the security indus- try itself, with vendors looking to provide enough sensationalism within their press releases covering a breaking story to hopefully win a mention in whatever coverage may be on offer, the role of clarity and consistency in the use of terminology comes to the fore. UNDERSTANDING THE REAL IMPACT OF CYBERCRIME Of organizations, 72% suffered some form of cyberattack in the past 12 months; 31% of organizations confirmed data was compromised; 11% of UK organizations do not prioritize cybersecurity; 61% of UK organizations do not rank cybersecurity in their top three priorities (The State of Cybersecurity 2015 Report by Tenable Network Security via smileonfridays.com press release.) 4 ª 2015 LogicNow Ltd. All rights reserved. 2015 E D P A C S SENSATIONALIZED STORIES SELL SOLUTIONS Even allowing for the fact that the media is, perhaps understand- ably, going to be drawn toward choosing the highest cost per record base it can find, or the biggest DDoS traffic rate, we still have to ask if these would be the correct metrics were restraint shown and acceptable averages agreed on. In other words, is there enough clarity and consistency in the use of terminology by both the security industry and the media when discussing cyberattacks? The answer is quite patently no; in fact, just the opposite. About the only consistency is the endless parade of security researchers pro- claiming how the attack in question is the biggest, longest, most costly or most advanced. Let’s look at some examples, starting with reports about the work of the Equation Group from earlier in the year. Kaspersky Labs used language such as “the God of cyberespio- nage” and “an astonishing technical accomplishment” not to men- tion that “Death Star of the Malware Galaxy” line from the title itself.3 While researchers have undoubtedly done good in uncovering Downloaded by [62.255.165.58] at 04:04 22 December 2015 the activity of this almost certainly state-sponsored (National Security Agency [NSA] it would appear) group, the report does itself and the security industry no favors by being vague with statements such as “busy infecting thousands, or perhaps even tens of thou- sands” that serve only to sensationalize the story. A story, and a sensationalist angle, that was quickly picked up within the specialist security news analysis sector and the wider online media alike. FierceGovernmentIT quoted a Kaspersky spokesperson calling the group “the most advanced threat actor we have ever seen,”4 while The Observer talks about the “brilliant encryption techni- ques” used,5 and the Inter-national Business Times focuses on “the sophisticated methods used throughout their operations.”6 The hyperbolic language spreads throughout the media, cour- tesy of one headline-grabbing article from a respected security source. Yet this group was involved in a cyber-intelligence opera- tion, not a cybercrime attack per se and you would expect a degree of sophistication from state-sponsored actors targeting hostile nation states and terrorist organizations. The impact of such language, however, is to give the impression that cybercrime has evolved to the same level of sophistication and advanced methodology, and this is something that business needs to fear and, of course, budget more to defend against. There was yet more sensationalist language used when reporting the Carbanak malware that was estimated to have cost banks (mostly located in Russia) anything up to a billion dollars in finan- cial losses. Kaspersky called this “The Great Bank Robbery” and talked of it as being “an unprecedented cyber robbery” marking “the beginning of a new stage in the evolution of cybercriminal activity”7 while Computer Business Review spoke of it being “the greatest series of cybercrimes committed in history”.8 LACK OF CLARITY IS HURTING THE INDUSTRY Again, there is no real clarity here when you consider that the loss was actually between a quarter of a million and a billion dollars, a wide estimate courtesy of the unwillingness of the banks to reveal ª 2015 LogicNow Ltd. All rights reserved. 5 E D P A C S 2015 exactly how much they lost and a certain degree of actually not knowing how much as the malware mimicked legitimate banking operations. To assume that this would once again up the stakes when it comes to necessary security defenses is a little premature. For a start, as with the Equation Group, the targets were very specific and if your organization falls outside of these cross hairs then there’s no point spending more to defend against an attack that is not going to happen. And, even if an attack did happen, the actual methodology to get the malware inside the organization was far from new and far from sophisticated. Look behind the headlines and you will find, where reporters bothered to cover the actual process of the attack, the malware came in a targeted e-mail with an infected .cpl (control panel) or Word document attachment, something that a combination of trained staff, patched machines, and a policy that enforced such attachments to be dropped would have mitigated without much effort or cost. Reports such as that which appeared on the U.S. News site with Downloaded by [62.255.165.58] at 04:04 22 December 2015 the headline “U.S. Nukes Face Up to 10 Million Cyber Attacks Daily” are another prime example of how sensationalist reporting can skew the reality of the threat.9 For a start, are those 10 million daily “attacks” actually attacks at all? The sub-head hints at the truth when it talks about “mil- lions of hacking attempts daily” and within a few column inches we discover that “Of the (10 million) security significant events, less than one hundredth of a percent can be categorized as suc- cessful attacks against Nuclear Security Enterprise computing infrastructure,” which drops it to about 1,000 a day, and we are still no closer to knowing how “successful” is defined in this exam- ple. It’s highly unlikely that such a secure defense system would be successfully hacked 1,000 times a day. And this is the point: When reporting and discussing the scale and impact of cybercrime it is imperative that we move away from sensationalizing of one part of the story or consequence of the breach, that which will create the biggest search engine feeding frenzy. Who the criminals were is of less importance than how they got in; compromise indicators are more valuable to other businesses than the financial cost to that particular victim (espe- cially when, as we have already said, financial loss varies so considerably from business to business and attack scenario to attack scenario). Moving the Measurement Needle Back from Attribution to Prevention The measurement metric dial has, ultimately, moved too far toward attribution and needs to be reset to prevention and a business-based analysis of risk once more. That business-based analysis itself needs to be more realistic, so there also has to be a move away from the kind of threat intelligence reporting that is almost exclusively domi- nated by data derived from the large enterprise sector and conse- quently of little relevance to the Small and Medium Business (SMB) market. The data on which threat intelligence and attack surface trend analysis resources are based must become more granular if it is to become more relevant across all business sectors. 6 ª 2015 LogicNow Ltd. All rights reserved. 2015 E D P A C S That data granularity can be driven by disclosure is something that has always been a hot corporate potato. However, slowly but surely both the security industry and business itself is coming around to the need for responsible disclosure as part of an informed and effective threat mitigation landscape. The days of companies keeping quiet for fear of reputational damage must come to an end, just as reckless whistle-blowing and sensational breach reporting has to stop. The keyword is respon- sible, and that responsibility has to come from all sides. One solu- tion would be the introduction of a standards-based scorecard for responsible data breach disclosure, and the likes of the NIST Computer Security Resource Center (CRSC),10 SANS Institute,11 and Australian Signals Directorate (ASD)12 would seem ideally placed to take the lead. Such a scorecard would be useful to iden- tify those controls that have either mitigated, failed, or simply had no impact as far as breach prevention was concerned. The Importance of Intelligence Sharing Downloaded by [62.255.165.58] at 04:04 22 December 2015 Of malicious files, 99.3% used a Command & Control Uniform Resource Locator (URL) that has been previously used by one or more other malware samples (2014). Of malware authors, 98.2% used Command & Control URLs found in five other types of malware.13 Of observed attacks, 75% spread from one victim to another within 24 hours. Of observed attacks, 40% hit a second organization within the hour.14 SCORECARD SYSTEMS WILL HELP DEFEND AGAINST ATTACK As there is just too much variability in determining both “worth” and “impact” of a breach across industry verticals using a numerical estimate, the scorecard system would surely be a more constructive way forward. This standards templating in a disclosure scorecard format would show which security controls were taken advantage of during a breach and other organizations in similar verticals could then make progress in defending against attack. Seen within a regulatory carrot approach, rather than the liti- gation stick option, this could come complete with a tradeoff of the threat intelligence made available to other businesses being balanced against a subsequent litigation cap upon the disclosed information. Benchmarking the adoption of specific controls iden- tified in a framework would collectively help other organizations defend against similar attacks. Without resorting to accusations of negligence unless the breach was devastatingly egregious, sharing mitigation successes and failures is better for the collective good. If we continue to go down the road of never disclosing or identifying the security components that failed or the components that were not in place when a breach happens, we will never make any progress against an elusive enemy. Fredrick the Great of Prussia said it best when he declared “he who defends everything, defends nothing.” ª 2015 LogicNow Ltd. All rights reserved. 7 E D P A C S 2015 We need data on how to defend and this is only derived from an open sharing of relevant and accurate attack information without fear of punitive litigation. Note 1. https://threatpost.com/verizon-dbir-challenges-data- breach-cost-estimates/112229 2. http://www.darkreading.com/attacks-breaches/china- hacked-rsa-us-official-says/d/d-id/1137409? 3. https://securelist.com/blog/research/68750/equation-the- death-star-of-malware-galaxy/ 4. http://www.fiercegovernmentit.com/story/kaspersky- uncovers-death-star-malware-galaxyexpertssuspect-nsa- link/2015–02-19 5. http://observer.com/2015/02/equation-group/ 6. http://www.ibtimes.co.uk/equation-group-meetnsa-gods- cyber-espionage-1488327 Downloaded by [62.255.165.58] at 04:04 22 December 2015 7. http://www.kaspersky.com/about/news/virus/2015/ Carbanak-cybergang-steals-1-bn-USD-from-100-financial- institutions-worldwide 8. http://www.cbronline.com/news/cybersecurity/data/carba nak-hackpoints-to-future-of-safe-computing-4512976 9. http://www.usnews.com/news/articles/2012/03/20/us- nukesface-up-to-10-million-cyber-attacks-daily 10. http://csrc.nist.gov/ 11. https://www.sans.org/critical-security-controls/ 12. http://www.asd.gov.au/infosec/ 13. Websense Security Labs 2015 Threat Report, https://com munity.websense.com/blogs/websense-news-releases/ archive/2015/04/08/websense-2015-threat-report-cyber crime-gets-easier-attribution-gets-harder-quality-over-quan tity-and-old-becomes-the-new.aspx 14. Verizon 2015 Data Breach Investigations Report, http:// www.verizonenterprise.com/DBIR/2015/ Davey Winder has been writing about IT security for more than two decades, and is a three-time winner of the BT Information Security Journalist of the Year title. An ex-hacker turned security consultant and journalist, Davey was given the prestigious “Enigma” award for his “lifetime contribution” to infor- mation security journalism in 2011. An Editorial Fellow at Dennis Publishing, Davey is Contributing Editor at PC Pro, IT Pro, and Cloud Pro. Ian Trump, CD, CPM, BA, is an ITIL certified Information Technology (IT) consultant with 20 years’ experience in IT security. From 1989 to 1992, Ian served with the Canadian Forces (CF), Military Intelligence Branch; in 2002, he joined the CF MP Reserves and retired as a Public Affairs Officer in 2013. His previous contract was managing IT projects for the Canadian Museum of Human Rights. Currently, Ian is the Security Lead at LogicNow working across all lines of business to define, create, and execute security solutions to promote a safe, secure Internet for businesses worldwide. 8 ª 2015 LogicNow Ltd. All rights reserved.