Yesterday, G DATA Advanced Analytics was present at the WKO eDAY:16 in Vienna; a magnificent event, gathering Austrian economists and security professionals. Talks and panels were centered around the question, how to level up on Austrian corporate security in times where the internet is a hostile place.
Live on stage that day was our own Marion Marschalek, who was invited to hold the afternoon keynote. The keynote topic, translated to English, would be “The good, the bad, and the clueless”, a title potentially covering so much that’s happening on today’s internet. There are a lot of WTFs in the cyber, right? On that specific occasion, the focus of ‘cyber’ was all on the wild, wild west of the internet. Just like Clint Eastwood and Lee Van Cleef in the prairie back in the days, we now all have fictional roles and lots of pretentions while hunting for the lost treasure. In reality, roles and intentions aren’t super clear anymore on the
To sum it up: Today, you could be chatting with a fridge on IRC. Also, your network could be nuked by a DDoS attack, carried out by an army of… home routers. Yes, indeed there are DDoS botnets operating on CPUs of routers. Furthermore, there are botnets being operated by criminals. And then, there are botnets being operated by spooks. One of those was used by the GCHQ to nuke Anonymous . Now go back home to check up on your router, will you? Scary.
Just like “Hello Barbie”, Mattel’s latest Barbie doll, pretty as ever, and, since recently, extravagantly smart. Because “Hello Barbie” can now listen, understand, and answer things your kid tells her . Or you. Or anyone else who is around, for that matter.
The keynote then moved on to critical infrastructures: lights in Ukraine went out early this year and the BlackEnergy malware was found to be the root cause of trouble [3, 4]. The world was shocked for this attack on critical infrastructure being the first of its kind on such large scale. Security pros on the other hand may be impressed the effort that went into the attack and its minute coordination , but aren’t really surprised by the attack itself, silently whistling told ya, told ya, told ya so.
Meanwhile, on the
cybercomputerycrime venue — the mere continuation of longstanding objectives with the more or less novel means of information technology  — incident responders have taken a step back from the general “It’s China”-attribution to accept that other nationals might also be occasionally involved. Nation states have done their share of espionage on corporations too [7-9], but we don’t quite know yet what that is all about.
What we do know is that nation states have done their share on espionage in general; not only in the Snowden era but naturally since the invention of secret services. The issue now with that particular wild, wild west at hand, is now that espionage has gotten a whole lot easier for nations with offensive capabilities in the information, computer, and network domain (commonly sold as cyber*) .
So it happened that some of this planet’s nations turned on to their own citizens with digital weapons. Countries like Bahrain and the UAE put political figures and activists to prison under the pretext of national security, based on information gathered on the cybers. The arms traders in that game are plenty, the two most nefarious are likely HackingTeam, and Gamma Group with their FinFisher product . Those companies operate on the lawful interception market and sell digital surveillance gear to those countries who opted to not develop their own .
If, in the end, you do want our advice on how to weapon up for the prairie: keep your eyes open and watch your data carefully, but don’t go crazy. It isn’t your fault wild west has turned upon us, but we all need to deal with it. A vast part of crime on the one side and privacy loss by surveillance on the other side are political concerns rather than technological ones. Meanwhile, ‘cyber’ has entered the agendas of parliaments and roundtables, on some occasions even us normal cowboys and -girls are asked for an opinion. Don’t be shy if that comes to you, Clint Eastwood wouldn’t be either.
Event website: https://www.wko.at/Content.Node/kampagnen/E-Day/index.html
 UK Government Used ‘Rolling Thunder’ DDoS Attacks Against Anonymous, LulzSec and Syrian Electronic Army, IBTimes
 About Hello Barbie, Mattel
 BlackEnergy APT Attacks in Ukraine employ spearphishing with Word documents, SecureList
 First on CNN: U.S. investigators find proof of cyberattack on Ukraine power grid, CNN
 Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid
 Russian hackers used Windows bug to target Nato, BBC
 Brazil-Canada espionage: Which countries are we spying on?, CBC News
 Snowden Documents Show U.S. Spied on Petrobras, Globo TV Reports, Bloomberg
 French Said to Spy on U.S. Computer Companies, New York Times
 Long-Term Strategy Needed When Analyzing APTs: Researcher, Security Week
 Schrodinger‘s cat video and the death of clear text, CitizenLab
 Here are all the sketchy goverment agencies buying HackinTeam‘s spy tech, Motherboard