{"id":110742,"date":"2017-11-30T14:37:00","date_gmt":"2017-11-30T14:37:00","guid":{"rendered":""},"modified":"2023-01-08T11:03:36","modified_gmt":"2023-01-08T11:03:36","slug":"rethinking-hack","status":"publish","type":"post","link":"https:\/\/cvnextjob.com\/index.php\/2017\/11\/30\/rethinking-hack\/","title":{"rendered":"Rethinking &quot;The Hack&quot;"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><h3 class=\"post-title entry-title\" itemprop=\"name\"><\/h3>\n<div class=\"post-header\"> <\/div>\n<p>Barely 11 days ago, the FBI announced they had identified the chief  culprit behind the hack of Sony Pictures, which delayed the release of a  major holiday film, and exposed damaging e-mails and financial  information that embarrassed the corporation and top executives.<\/p>\n<p><a href=\"http:\/\/www.hollywoodreporter.com\/news\/sony-hack-fbi-confirms-north-759485?utm_source=Yahoo&amp;utm_campaign=Syndication&amp;utm_medium=Sony+Hack%3A+New+Evidence+Points+to+Inside+Job%2C+Security+Experts+Say\">According to the bureau&#8217;s cyber experts<\/a>,  North Korea was behind the hack, apparently in retaliation for Sony&#8217;s  planned release of &#8220;The Interview&#8221; a comedy about a talk show host (and  his producer) hired by the CIA to kill DPRK dictator, Kim Jong-un.&nbsp;  Needless to say, the hermit kingdom didn&#8217;t find that premise very  amusing, so they (allegedly) launched a major cyber strike on Sony,  revealing everything from the social security numbers of studio  employees, to gossip-filled e-mails between executives and top producers  which confirmed that many of Hollywood&#8217;s elites are nothing more than  hypocrites. <\/p>\n<p>While that revelation was hardly surprising, the Sony hack represented  the most serious cyber attack (to date) against a major corporation and  it even became a free speech issue when the  studio&#8211;temporarily&#8211;threatened to pull the picture.&nbsp; Since then, &#8220;The  Interview&#8221; has been shown in limited release, at independent movie  theaters and on-line. <\/p>\n<p>But security experts have long expressed doubt that Pyongyang was  entirely responsible for the hack, citing a lack of conclusive  evidence.&nbsp; And that theory has gained steam in recent days, with various  security firms claiming that the attack was, at least partially, an  &#8220;inside job.&#8221;&nbsp; From the <a href=\"https:\/\/tv.yahoo.com\/news\/sony-hack-evidence-points-inside-job-security-experts-050002585.html?.tsrc=appleww\"><i>Hollywood Reporter<\/i><\/a>:<\/p>\n<div id=\"yui_3_16_0_1_1419984024677_894\"><span style=\"font-size: xx-small;\">Despite the <a data-rapid_p=\"8\" href=\"http:\/\/www.hollywoodreporter.com\/news\/sony-hack-fbi-confirms-north-759485?utm_source=Yahoo&amp;utm_campaign=Syndication&amp;utm_medium=Sony+Hack%3A+New+Evidence+Points+to+Inside+Job%2C+Security+Experts+Say\" id=\"yui_3_16_0_1_1419984024677_893\" target=\"_blank\" rel=\"noopener\">FBI declaring that North Korea<\/a> was behind the devastating cyberattack on Sony Pictures Entertainment,  security experts continue to believe that the hack was an inside job,  reports The Security Ledger.&nbsp;<\/span><\/div>\n<div id=\"yui_3_16_0_1_1419984024677_894\"><\/div>\n<div id=\"yui_3_16_0_1_1419984024677_1733\"><span style=\"font-size: xx-small;\">Security  firm Norse claims it has evidence that shows the Sony hack was  perpetrated by six individuals, including two based in the U.S., one in  Canada, one in Singapore and one in Thailand. Norse senior vp  Kurt&nbsp;Stammberger told the&nbsp;Ledger, a security industry news website,&nbsp;that  among the six was one former Sony Pictures employee, a 10-year veteran  of the company with a very technical background who was laid off in May  following restructuring. <\/span><\/div>\n<div id=\"yui_3_16_0_1_1419984024677_1733\"><\/div>\n<div id=\"yui_3_16_0_1_1419984024677_1733\"><span style=\"font-size: xx-small;\">The Ledger writes: \u201cResearchers from the company followed that  individual online, noting angry posts she made on social media about the  layoffs and Sony. Through access to IRC (Internet Relay Chat) forums  and other sites, they were also able to capture communications with  other individuals affiliated with underground hacking  and&nbsp;hacktivist&nbsp;groups in Europe and&nbsp;Asia.\u201d<\/span><\/div>\n<div id=\"yui_3_16_0_1_1419984024677_1733\"><\/div>\n<div id=\"yui_3_16_0_1_1419984024677_1733\"><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">While  the analysis from Norse is not considered conclusive, the company&#8217;s  findings were shared with the FBI earlier this week, and they are  consistent with those of other experts.&nbsp; Almost a month ago, senior  officials at AlienVault and Exabeam (among others) postulated that an  insider was involved, noting that hackers knew the hardcoded names of  Sony network servers, along with the credentials\/usernames and passwords  needed to access the system.&nbsp;&nbsp;<\/span><\/span><\/div>\n<div id=\"yui_3_16_0_1_1419984024677_1733\"><\/div>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">So  far, the FBI is sticking by its publicly-stated theory.&nbsp; And there may  be a good reason for that, namely the fact that the bureau has access to  information beyond the reach of security companies in the private  sector.&nbsp; Fact is, the FBI maintains a close working relationship with  NSA on cyber-security issues and can draw upon that agency&#8217;s vast  expertise in that field. &nbsp; In fact, some members of the FBI&#8217;s cyber  division are stationed at NSA HQ at Fort Meade, MD, to facilitate  liaision efforts between the organizations.&nbsp; It&#8217;s a safe bet the FBI&#8217;s  &#8220;North&nbsp; Korea&#8221;&nbsp; analysis was based, at least in part, on data provided  by NSA, and so far, the feds have said virtually nothing about the role  of the SIGINT agency in the Sony investigation. If the assessment is  based on NSA data, it would add more credence to the North Korean angle.<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">In  fact, a better question might be why NSA hasn&#8217;t established a  partnership with Sony and other American entertainment companies, given  their prominence in the global market.&nbsp; Shane Harris provided new  details on these alliances in his recently-published book <i>@War: the Rise of the Military-Internet Complex <\/i>(H\/T: Tech Dirt): <\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\">The NSA helps the companies find weaknesses in their products. But it  also pays the companies not to fix some of them. Those weak spots give  the agency an entry point for spying or attacking foreign governments  that install the products in their intelligence agencies, their  militaries, and their critical infrastructure. Microsoft, for instance,  shares zero day vulnerabilities in its products with the NSA before  releasing a public alert or a software patch, according to the company  and U.S. officials. Cisco, one of the world\u2019s top network equipment  makers, leaves backdoors in its routers so they can be monitored by U.S.  agencies, according to a cyber security professional who trains NSA  employees in defensive techniques. And McAfee, the Internet security  company, provides the NSA, the CIA, and the FBI with network traffic  flows, analysis of malware, and information about hacking trends. <\/p>\n<p>Companies that promise to disclose holes in their products only to the  spy agencies are paid for their silence, say experts and officials who  are familiar with the arrangements. To an extent, these openings for  government surveillance are required by law. Telecommunications  companies in particular must build their equipment in such a way that it  can be tapped by a law enforcement agency presenting a court order,  like for a wiretap. But when the NSA is gathering intelligence abroad,  it is not bound by the same laws. Indeed, the surveillance it conducts  via backdoors and secret flaws in hardware and software would be illegal  in most of the countries where it occurs.&nbsp;<\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">According  to Mr. Harris, a number of companies have been invited to form  partnerships with NSA, including tech firms, on-line security providers,  and organizations that fall within the 16 categories of &#8220;critical  infrastructure&#8221; that are allowed to have alliances with the agency.&nbsp;  Communications companies form one category of infrastructure, but it  doesn&#8217;t appear that entertainment firms fall under that heading,  although &#8220;theme parks and casinos&#8221; are also defied as critical  infrastructure elements. &nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">With  the Sony hack, the categories of companies that can partner with NSA may  be expanded once again.&nbsp; Under current rules, there isn&#8217;t much the  agency can do.&nbsp; In recent testimony before Congress, the NSA Director,  Admiral Michael Rogers, said his organization can &#8220;watch&#8221; an attack  develop and follow its targeting of specific companies and networks, but  the agency cannot contact an affected firm on its own, unless it falls  under a critical infrastructure category, and a formal agreement is in  place.&nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">In his  book. Mr. Harris notes that NSA offers classified briefings and  &#8220;limited-duration&#8221; security clearances to executives from tech firms.&nbsp;  The presentations are aimed at &#8220;scaring&#8221; the companies into partnerships  with NSA, based on threat information provided by the spy agency.&nbsp;  According to individuals familiar with the program, NSA has little  difficulty convincing companies to work with them, since many of the  presentations offer information beyond the reach of most security firms.  &nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">That&#8217;s  why the North Korean connection cannot be completely ruled out in the  Sony case, and it&#8217;s the likely reason the FBI hasn&#8217;t retracted its  original assessment.&nbsp; There may be information&#8211;beyond the limited  forensic data offered so far&#8211;that puts Pyongyang in league with the  hackers.&nbsp; Of course, that assumes the feds have their facts straight and  that isn&#8217;t always the case.&nbsp; According to <a href=\"http:\/\/www.businessinsider.com\/the-fbi-may-have-made-a-huge-mistake-in-its-investigation-of-the-sony-hack-2014-12\">Business Insider<\/a>, an FBI bulletin on the threat of future attacks was based (in part) on fake posts and messages created by a prankster.&nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">Unfortunately,  such errors don&#8217;t inspire much confidence in the federal guardians of  our on-line infrastructure.&nbsp; Neither do new reports about NSA analysts  using the agency&#8217;s vast collection resources to spy on current and  former lovers and spouses.&nbsp; It&#8217;s hard to do you job when you&#8217;re trying  to trace the phone calls, e-mails and text messages of an ex-wife or  current girlfriend or boyfriend. &nbsp; &nbsp; <\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Barely 11 days ago, the FBI announced they had identified the chief culprit behind the hack of Sony Pictures, which delayed the release of a major holiday film, and exposed damaging e-mails and financial information that embarrassed the corporation and top executives. According to the bureau&#8217;s cyber experts, North Korea was behind the hack, apparently [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/110742"}],"collection":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/comments?post=110742"}],"version-history":[{"count":0,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/110742\/revisions"}],"wp:attachment":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/media?parent=110742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/categories?post=110742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/tags?post=110742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}