Cybersecurity news had a distinctive international flavor last week.
In South Korea, a cyberattack from unknown sources disrupted portions of the nation’s banking and broadcast industries.
During the attacks, a North Korean Human Rights website based in Washington, D.C. was also defaced.
Because of bellicose actions by North Korea in recent weeks, fingers began pointing at that rogue state. Investigators later traced the attack to a Chinese IP address.
Security researchers analyzing the attack found the Windows malware used was actually a cocktail that included a component to wipe data from Linux machines. It’s very unusual to see malware that attacks multiple operating systems, security software maker Symantec noted in a blog post.
Taiwan: China Targeting Our Infrastructure
While South Korea was under cyberattack, Taiwan started waving a red flag about attacks by Chinese hackers on its computer systems.
Appearing before a legislative committee on the island republic, the director general of Taiwan’s National Security Bureau reportedly said that China has been stepping up its online aggression, moving from stealing information to exploring ways to destroy the country’s infrastructure.
Two significant reports regarding cybercrime and cyberwar in Europe were released last week.
Europol, in the most detailed study of its kind yet by the continent’s law enforcement community, identified 3,600 organized crime groups active in the European Union and detailed how the Internet contributed to their operations.
“The advantages of technology are great on the one hand, but we also have to keep in mind that bad guys use it as well or better than good guys,” Steve Durbin, global vice president for the Information Security Forum, told TechNewsWorld.
Organized online gangsters have another advantage over law enforcement, he added.
“The bad guys don’t suffer from budget control,” he said. “If they need more money, they just steal it.”
On the cyberwarfare front, a group of 20 experts enlisted by NATO to work on the connections between international law and online warfare released a document detailing the result of their labors.
Among the findings in the Tallinn Manual on the International Law Applicable to Cyber Warfare is that in some circumstances, deadly force can be legally used against organized hackers.
Microsoft, too, found itself involved in international intrigue last week. It is reportedly being investigated by the U.S. Justice Department and Security and Exchange Commission for alleged kickbacks by its agents in China, Italy and Romania.
Neither Microsoft nor any other company needs to resort to corrupt practices to get business done in China, according to Dan Harris, a partner with Harris & Moure, which sponsors the China Law blog.
“As a lawyer, we’ve done hundreds of registrations in China — trademarks, copyrights, licensing agreements. We have never been hit up for a bribe,” he told TechNewsWorld.
Screen Lock Flaws
A news development outside the international realm involved the continuing efforts by Samsung and Apple to work out bugs in the lock screens on their mobile phones.
Apple pushed out an update to its mobile operating system to address a bug that allowed the lock screen to be circumvented by exploiting the emergency call feature of its phones.
No sooner had the update been released than another bug was uncovered that allowed the same kind of exploit, although this one was limited to the iPhone 4.
Meanwhile, similar lock screen problems were discovered with Samsung’s version of Android.
“This bug just lowers the bar to a level where a petty thief or inquisitive roommate or lover can get at all the stuff on your phone,” Andrew Conway, a threat researcher with Cloudmark told TechNewsWorld.
One reason problems keep showing up in these operating systems is that the development cycles for the products is taking on an insane pace, according to Andrzej Kawalec, global chief technology officer for HP Enterprise Security Services.
“Application development life cycles keep getting shorter and developers aren’t motivated to deliver secure code,” he told TechNewsWorld. “They’re being motivated to deliver applications as fast as possible. Every time you accelerate or invent a new process, you introduce vulnerabilities.”