Web Analytics
  • Secure Channels

SCI CEO Blech Responds To White House Hack In Computer Weekly

Secure Channels Inc. CEO On Alleged Russian Hack Involving The White House

Alleged White House hack highlights typical security failings, say experts

The alleged penetration of sensitive White House computer networks highlights typical security failings, say information security experts.

However, the White House has denied a CNN report that Russian hackers behind an intrusion at the US State Department in late 2014 also penetrated sensitive parts of the White House IT system.

US officials have also refused to confirm that Russian hackers were responsible for the breach, saying they “do not talk about where cyber intrusions originate from”, reported ABC News.

The statement attributed to deputy national security advisor Ben Rhodes comes in stark contrast to the US attribution of the November 2014 attack on Sony Pictures to North Korea that led to fresh sanctions.

However, US National Security Council spokesperson Mark Stroh said although the breach affected the unclassified “Executive Office of the President” network, any such activity is taken very seriously.

While separate from classified systems, that network is used to exchange sensitive information about White House activities.

“We took immediate measures to evaluate and mitigate the activity,” said Stroh.

According to the CNN report, the hackers were able to use the breach at the US State Department as a springboard for a subsequent attack against the White House.

CNN quoted an unnamed US official as saying the hackers had been able to access unclassified but prized “sensitive information, such as real-time non-public details of the president’s schedule”.

Security commentators have used the reports to highlight the need for those responsible for information security to adopt a more proactive approach.

Dwayne Melancon, chief technology officer at security firm Tripwire, noted that once an attacker gets into an organisation’s IT systems, it can be notoriously difficult to get them out.

“This is particularly true when your network and internal security controls allow the attacker to move around on your network without being noticed,” he said.

“That appears to be the case here, which could be the result of an outwardly focused security approach. If you assume the enemy is ‘out there’ you stop noticing their activities when they get ‘in here’.”

Melancon also noted that attribution is difficult because a savvy attacker can not only cover their tracks, they can often mislead investigators into believing someone else is behind the attacks.

He said he believes it is far more important for organisations to have a baseline understanding of what is normal on their internal network and systems.

“Without that understanding, it is difficult to tell which systems you can trust, which systems you can’t and – more importantly – how to stop the attack and prevent future compromises,” said Melancon.

Phishing operation the most likely avenue for hackers

Independent security consultant Graham Cluley said the most likely avenue for the hackers would have been a plain-and-simple phishing operation, tricking users into handing their passwords over to the hackers, or visiting a web page which contains a drive-by malware attack designed to pilfer login credentials.

“Yes, it’s basic social engineering – but it works an astonishing amount of the time,” he wrote in a blog post, underlining the importance of educating users on how to recognise and report phishing and other social engineering attacks.

But Secure Channels chief executive Richard Blech said technology still has a role, arguing that in this case, strong encryption would have prevented the breach from even being a news story.

“Hackers are always going to get in, the data has to be encrypted when it is stolen, when removed the data will be useless. Or we can continue to treat real cyber security as an afterthought. The choice is ours, I will go with the encryption,” he said.

Although there has been no indication that the US is considering sanctions against Russia in retaliation for the breach, Tripwire security and risk strategist Tim Erlin speculated that it may have been one of the motivating factors behind US president Barack Obama’s recent executive order setting up a framework for imposing sanctions on foreign hackers.

“The information security industry is likely to be disappointed with the lack of details on how attribution was determined. There will no doubt be debate among experts,” he said.

“We live in a world where commerce is interconnected globally, and the increasing visibility of cyber attacks, along with nation-state attribution, will have a negative effect on business.”

Find the original article here.

More articles with CEO Richard Blech can be found at securechannels.com

#Irvine #CyberSecurity #DataSecurity #RichardBlech #Hack #Breach #patentedencryption #RussianHackers #SecureChannels #WhiteHouse

Secure Channels BRINGS to market data encryption, cryptographic protocols, and access control/ privileged access/ user authentication technologies in the form of licensable tools, end user platforms and purpose-built solutions, SERVING software & application developers, hardware OEM and device manufacturers, and enterprise organizations, WHO place a premium on cybersecurity, risk reduction, and operational performance benefits or competitive differentiation provided, ALLOWING them to replace, augment, or introduce to new cryptography into their products or environments, PROVIDING material and measurable cybersecurity protections, risk reduction and data breach mitigation.

Secure Channels Inc. 

16400 Bake Parkway, Suite 100  |  Irvine, CA 92618  |  T: (855) 825-6766  |  E: contact@securechannels.com

Follow us!

  • Facebook
  • LinkedIn
  • Twitter

Copyright © 2020 Secure Channels Inc. All rights reserved