My latest article is up on Geekwire: How hacked is hacked? Here’s a ‘hack scale’ to better understand the SolarWinds cyberattacks.
[Note: This scale is now posted on its own page here.]
While doing some work around the SolarWinds hacks, I realized that there’s just no simple triage scale that we in the industry can use to simply and succinctly characterize the severity of hacks.
This is my proposal for a simple scale to enable simple but meaningful comparisons of the severity of hacks.
Since the most important thing in hacks is the spread and severity, the cancer staging system gives a good model for measuring these kinds of things so this is adapted from that.
- Stage 0: The attackers have found or made an entry point to systems or the network but haven’t used it or took no action.
- Stage I: Attackers have control of a system but haven’t moved beyond the system to the broader network.
- Stage II: Attackers have moved to the broader network and are in “read-only” mode meaning they can read and steal data but not alter it.
- Stage III: Attackers have moved to the broader network and have “write” access to the network meaning they can alter data as well as read and steal it.
- Stage IV: Attackers have administrative control of the broader network meaning they can create accounts and new means of entry to the network as well as alter, read and steal data.
(Also posted on Medium)
In my latest Geekwire article “How the SolarWinds hackers are targeting cloud services in unprecedented cyberattack, I continue looking at the SolarWinds event, this time digging into the SAML token angle that’s not been covered very well. Others have either ignored it entirely or touched on it in a light, technically unclear/inaccurate way all leading to confusion and a lack of appreciation for how serious this angle is.
For my latest article on Geekwire, I dig into Amazon’s plans for their new Sidewalk offering looking at how they’ve chosen to deploy it using “forced opt-in”, how that mirrors and differs from Comcast’s deployment of Xfinitywifi, and what it means moving forward.
I recently got to talk with Joe Tidy with the BBC Online about my work as a volunteer along with others as part of the University of Chicago’s Harris School of Public Policy Election Cyber Surge program.
For more details check out “‘Why I bought a voting machine on eBay’ – the hackers protecting US election“.
As we get ready for back to school, I just posted a new blog on the Proofpoint blog: “Back to School Online: 5 Steps to Better Protect Your Children“.
This posting covers five things you can do to help better protect your children, especially if you’re doing remote or mixed in-person/remote schooling.
Today we read about the likely death in a drone attack of an ISIS hacker/warrior/cyber-jihadist:
In the infosecurity world, we’ve heard for years about the idea of “hackback“, basically an offensive response to an offensive action. Every couple of years this idea comes back around as someone gets frustrated with feeling like the attackers have all the advantages (and fun) and wants to take the fight back to them.
It’s an understandable idea. And, in some measured cases may even make sense. But as a blanket rule, no it’s not a good idea.
This latest development shows that “hackback” doesn’t need to be contained to computer tactics: a physical or kinetic response is just as (if not more) effective.
The bigger story though is how this shows that the idea of “infosecurity” is more and more an empty concept and that it’s all just “security”.
My latest posting over at Geekwire is my analysis and commentary on why Hillary Clinton using a “homebrew” email server is a major security problem.
I got to talk with KIRO Radio here in Seattle recently about some of the risks with new, untested digital wallet cards like the new offering from Stratos. Plus, my comments on how cash may make a comeback.