Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Storage

    Cyber-Attacks on Infrastructure Firms Highlight Need for New Defenses

    By
    Robert Lemos
    -
    April 10, 2013
    Share
    Facebook
    Twitter
    Linkedin

      Multiple campaigns against a variety of critical industries and manufacturing firms in the past year have underscored the changing nature of online threats, security experts claimed following a report highlighting the attacks.

      In January, attackers successfully compromised specialty Websites, such as the Council on Foreign Relations and Capstone Turbine Corp. The attacker succeeded in hosting malware on the sites to infect visitors. Such a tactic, known as a waterhole attack, was one of the types of campaign highlighted in a quarterly report released by the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT).

      The success of the attacks—as well as targeted email-based attacks known as spear-phishing—should worry corporate executives and government officials, especially after the damaging attacks that deleted data at oil giant Saudi Aramco last year and at major South Korean organizations last month, Anup Ghosh, CEO and co-founder of endpoint-protection firm Invincea, told eWEEK.

      “Business as usual is no longer good enough,” he said. “We have to wonder if, whatever groups are doing this, are preparing for cyber-attacks like against Saudi Aramco.”

      Neither of the attacks was totally new: Spear-phishing has been around for years. But the fact that traditional defenses—such as antivirus and anti-spam—still fail to stop the attacks should raise alarms, Ghosh said. In another attack detailed in the report, 11 energy firms were targeted last year with convincing email messages designed to infect the companies’ systems. Those attacks failed, but spear-phishing has landed other major catches, such as RSA, Google and many defense contractors.

      With intellectual property regularly stolen from U.S. and European companies and government agencies, a more reliable strategy needs to be developed to counter the attacks, which previous reports have laid at the feet of nation-states—most often China—or independent hackers acting on behalf of a national government. Despite a February report released by Mandiant detailing the evidence linking a Chinese military agency with widespread hacking and information theft, the U.S. response is still anemic, says Ghosh.

      “It’s time to start calling these guys out,” he said. “Why don’t we find out who is behind these attacks and publicize that and hold them accountable in as many ways as possible?”

      Other CEOs are equally frustrated with the lack of progress in stemming the loss of information to nation-state hackers. In prepared remarks to the Senate Committee on Homeland Security and Government Affairs on March 7, David E. Kepler, chief information officer at Dow Chemical Co. stressed that, with all his company’s efforts to secure data, the government has a major and aggressive role to play.

      “Industry must rely on the federal government to approach cyber-security, working in partnership with other countries, to deploy an offensive perspective by preempting attacks when possible and through the pursuit and prosecution of the criminals behind these threats,” Kepler said.

      Asking companies to rely on their employees as a front line defense against these attacks is unreasonable, said Invincea’s Ghosh. In the ICS-CERT report, one of the recommended actions is for users to “not click on Web links or open attachments from unsolicited emails.” It’s time to do better than that, he said.

      “They have to stop putting out guidance that isn’t working and hasn’t worked for more than a decade,” Ghosh said.

      Robert Lemos
      Robert Lemos is an award-winning freelance journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      MOST POPULAR ARTICLES

      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×