Cyberstability Update – August 2019

Cyberstability Update – August 2019

September 6, 2019, Monthly update

Download Publication Download Document

Cyberstability Update – August 2019

Global Commission Meets Ahead of EuroDIG in The Hague, the Netherlands 

This article was published on the GCSC website, 1 July 2019

The Global Commission on the Stability of Cyberspace (GCSC) conducted its third meeting of 2019 in The Hague, the Netherlands, on 16-17 June. The meeting took place ahead of EuroDIG, held in The Hague from 19-20 June.

Tags: Global Commission on the Stability of Cyberspace.

Read More


North Korea cyberattacks generate $2 billion for weapons program

This article was published by Wesley Rahn on DW, 5 August 2019

North Korea is using cyberattacks on banks and cryptocurrency exchanges to fund its weapons programs, according to a UN Security Council report seen by Reuters news agency on Monday. The report, compiled by independent experts monitoring Pyongyang’s compliance with international sanctions over the past six months, said that North Korea is carrying out “widespread and increasingly sophisticated” cyberattacks. The experts say these measures have so far netted the rogue state over $2 billion (€1.7 billion).

Tags: GCSC Commissioner James Andrew Lewis.


A Secure Network Is Not Enough, Cyber Wargames Show

This article was published by Sydney J. Freedberg Jr. on BreakingDefense, 7 August 2019

If a hacker shuts off a base’s electricity or stops spare parts from arriving on time, they can sabotage a military mission without ever attacking a military network.

Tags: GCSC Norm on Basic Cyber Hygiene as Foundational Defense


Cyberattacks against industrial targets have doubled over the last 6 months

This article was published by Charlie Osborne on ZDNet, 5 August 2019

Cyberattacks designed to cause damage have doubled in the past six months and 50 percent of organizations affected are in the manufacturing sector, researchers say. On Monday, IBM’s X-Force IRIS incident response team published new research based on recent cyberattacks they have been called in to assist with, and the main trend the group is witnessing is the rise of destructive malware.

Tags: GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


Sign up to the weekly newsletter! 

This Cyberstability Update is an overview of all articles included in our Weekly Newsletters for the month. Want to receive these updates on a weekly basis? Sign up here to receive our weekly newsletter on the work of the Global Commission on the Stability of Cyberspace (GCSC), its members and developments in the field of international cyber policy.


 National Policy


Estonia debuts first-ever cyber diplomacy training, CyberScoop.

Tags: GCSC Commissioner Christopher Painter.


India Is the World’s Leader in Internet Shutdowns, Foreign Policy.

Tags: Global Commission on the Stability of Cyberspace.


Israel eases rules on cyber weapons exports despite criticism, Reuters.

Tags: GCSC Commissioner Isaac Ben-Israel.


Cyber Deterrence is Overrated, German Institute for International and Security Affairs.

Tags: Global Commission on the Stability of Cyberspace.


‘Five Eyes’ alliance calls for backdoor access to WhatsApp and other encrypted communications, Computing.

Tags: GCSC Co-Chair Michael Chertoff.


Russia Solidifies Grip on its Cyberspace, via the Sovereign Internet Law, International Policy Digest.

Tags: Special Advisor Vint Cerf.


Governing Cyberspace: State Control vs. The Multistakeholder Model, Belfer Center.

Tags: Global Commission on the Stability of Cyberspace.


Exporting digital authoritarianism: The Russian and Chinese models, Brookings.

Tags: Global Commission on the Stability of Cyberspace.


Chinese-style ‘digital authoritarianism’ rising around world – study, South China Morning Post

Tags: GCSC Co-Chair Michael Chertoff. 


China’s PLA seeks to bring cyberwarfare units under one roof, South China Morning Post.

Tags: GCSC Commissioner James Andrew Lewis.


National Security Concerns Threaten Undersea Data Link Backed by Google, Facebook, The Wallstreet Journal

Tags: Global Commission on the Stability of Cyberspace.


Federal Ban on Chinese Telecom Equipment Takes Effect, Nextgov.

Tags: GCSC Norm to Protect the Public Core of the InternetGCSC Norm to Avoid Tampering.


Selling to Huawei, CSIS.

Tags: GCSC Commissioner James Andrew Lewis.


American Tech Shudders as China Cyber Rules Are Expected to Get Tougher, The Wall Street Journal.

Tags: Global Commission on the Stability of Cyberspace.


Getting the Drop in Cyberspace, Lawfare.

Tags: Global Commission on the Stability of Cyberspace.


Feds plan to use SecureDrop as a vulnerability reporting portal, CyberScoop.

Tags: GCSC Commissioner Jeff Moss.


Time for a Cyber-Attack Exception to the Foreign Sovereign Immunities Act, JustSecurity.

Tags: Global Commission on the Stability of Cyberspace.


 Global Governance


Cyber peace and security, Reaching Critical Will.

Tags: Global Commission on the Stability of Cyberspace.


International Law and Cyber Activity: Why are a set of governing norms needed?, Lexology.

Tags: Global Commission on the Stability of Cyberspace.


Contract for the Web draft: it’s time to add your voice, a contract for the web.

Tags: Global Commission on the Stability of Cyberspace.


 Threats and Risk Mitigation


Recent breaches reaffirm it’s time to modernize the Social Security Number, The Hill.

Tags: GCSC Commissioner James Andrew Lewis.


GCC organisations need stronger resilience strategies to restore critical functions after disruptive events: Booz Allen Hamilton, Oilandgas.com.

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities.


The Cybersecurity 202: Hackers just found serious vulnerabilities in a U.S. military fighter jet, The Washington Post.

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities.


Army faces familiar workforce woes in cyber, electronic warfare units, FCW.

Tags: Global Commission on the Stability of Cyberspace.


How the Army is strengthening cyber cities, Fifth Domain.
  

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities.


How the Air Force relied on hackers to secure its move to the cloud, CNet.

Tags: GCSC Norm for States to Create a Vulnerability Equities ProcessGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


Episode 158: How NotPetya has Insurers grappling with Systemic Cyber Risk, The Security Ledger.

Tags: GCSC Secretariat Co-Director Bruce McConnell.


How an NSA researcher plans to allow everyone to guard against firmware attacks, CyberScoop.

Tags: GCSC Norm to Reduce and Mitigate Significant VulnerabilitiesGCSC Norm Against Offensive Cyber Operations by Non-State Actors.


When Ransomware Cripples a City, Who’s to Blame? This I.T. Chief Is Fighting Back, The New York Times.

Tags: GCSC Commissioner James Andrew Lewis.


The World’s Most Elite Cybercrime Fighting Unit, Nanalyze.

Tags: GCSC Commissioner Ilya Sachkov.


WhatsApp Hack Attack Can Change Your Messages, Forbes.

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities.


Conflict in Cyberspace


 UN probing 35 North Korean cyberattacks in 17 countries, AP News.
  

Tags: Global Commission on the Stability of Cyberspace.


US Cyber Command has publicly posted malware linked to a North Korea hacking group, TechCrunch.

Tags: Global Commission on the Stability of Cyberspace.


The Age of Digital Geopolitics & Proxy War Between US and China, Inter Press Service.

Tags: GCSC Commmissioner Wolfgang Kleinwächter.


Chinese State Hackers Suspected Of Malicious Cyber Attack On U.S. Utilities, Forbes.

Tags: Global Commission on the Stability of Cyberspace.


U.S. Cyberattack Hurt Iran’s Ability to Target Oil Tankers, Officials Say, The New York Times

Tags: Global Commission on the Stability of Cyberspace.


High-Level Cyber Intrusions Hit Bahrain Amid Tensions With Iran, The Wall Street Journal.

Tags: Global Commission on the Stability of Cyberspace.


From State-Sponsored Attackers to Common Cybercriminals: Destructive Attacks on the Rise, SecurityIntelligence.

Tags: GCSC Norm Against Offensive Cyber Operations by Non-State Actors.


Foreign power was behind cyber attack on Czech ministry: Senate, Reuters.

Tags: Global Commission on the Stability of Cyberspace.


Russia Suspected by Some in Giant Bulgaria Hack, The New York Times.

Tags: GCSC Norm Against Offensive Cyber Operations by Non-State Actors.


The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity, Phil Quade.

Tags: GCSC Co-Chair Michael Chertoff.


Black Hat: The Cyber Shell Game – War, Information Warfare, and the Darkening Web, SMBNation.

Tags: Director of the GCSC Secretariat Alexander Klimburg.


BBC: The Battle to Control Cyberspace, The Hague Centre for Strategic Studies.

Tags: Director of the GCSC Secretariat Alexander Klimburg.


Collective Intelligence Podcast, Alexander Klimburg on Ideologies and Cyber Conflict, Flashpoint.

Tags: Director of the GCSC Secretariat Alexander Klimburg.


 Industry and Civil Society Developments


Asia’s Great Huawei Debate, The Diplomat.

Tags: GCSC Commissioner Motohiro Tsuchiya.


From the iPhone to Huawei: The new geopolitics of technology, The Brookings Institution.

Tags: Global Commission on the Stability of Cyberspace.


Part IV: As Hate Speech Proliferates Online, Critics Want to See and Control Social Media’s Algorithms, BroadbandBreakfast.

Tags: GCSC Commissioner Jonathan Zittrain.


Google Project Zero: 95.8% of all bug reports are fixed before deadline expires, ZDNet.

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities.


Maintaining the integrity of our platforms, Google

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities.


Twitter Shuts Chinese Accounts Targeting Hong Kong Protests, SecurityWeek.

Tags: GCSC Commissioner James Andrew Lewis.


Funders threaten to quit Facebook project studying impact on democracy, Reuters.

Tags: Global Commission on the Stability of Cyberspace.


Just Security Launches the Russia Investigation Congressional Clearinghouse, JustSecurity.

Tags: GCSC Norm to Protect the Electoral Infrastructure.


Internet Routing Security Initiative Launches Online ‘Observatory’, DARKReading.

Tags: GCSC Norm to Protect the Public Core of the Internet.


Cisco to pay $8.6 million fine for selling government hackable surveillance technology, The Washington Post.

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities.


GitHub confirms it has blocked developers in Iran, Syria and Crimea, TechCrunch.

Tags: Global Commission on the Stability of Cyberspace.


To save the internet, Silicon Valley is sending it to space, Astronomy.

Tags: Special Advisor Vint Cerf.


Cyber Stability Conference 2019: Summary Report, UNIDIR.

Tags: Global Commission on the Stability of Cyberspace.


 Breach Updates


Capital One Breach Shows a Bank Hacker Needs Just One Gap to Wreak Havoc, The New York Times

Tags: GCSC Norm Against Offensive Cyber Operations by Non-State Actors.


Watchdog Uncovers Cyber Gaps at Radioactive Waste Facility, Nextgov.

Tags: GCSC Norm to Reduce and Mitigate Significant VulnerabilitiesGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


Yet another hacking group is targeting oil and gas companies, Dragos says, CyberScoop.

Tags: GCSC Norm to Reduce and Mitigate Significant VulnerabilitiesGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


About the KNOB Attack, KnobAttack.

Tags: GCSC Norm to Reduce and Mitigate Significant VulnerabilitiesGCSC Norm Against Offensive Cyber Operations by Non-State Actors.


The Rise of “Bulletproof” Residential Networks, KrebsonSecurity.

Tags: GCSC Norm to Protect the Public Core of the InternetGCSC Norm Against Offensive Cyber Operations by Non-State Actors.


Hackers Subvert Security Checks Like the Browser Padlock, The Wallstreet Journal.

Tags: GCSC Norm to Protect the Public Core of the InternetGCSC Norm Against Offensive Cyber Operations by Non-State Actors.


Next Generation Cyber: Malware-Free Attacks, InfoSecurity Magazine.

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities.


‘Cloud Atlas’ Cyberspies Use Polymorphic Malware in Government Attacks, SecurityWeek.

Tags: GCSC Norm Against Offensive Cyber Operations by Non-State Actors.


With warshipping, hackers ship their exploits directly to their target’s mail room, TechCrunch.

Tags: Global Commission on the Stability of Cyberspace.


More than 3 million customer records from Sephora reportedly being peddled on Dark Web, says cybersecurity firm, The Online Citizen.

Tags: GCSC Commissioner Ilya Sachkov.


Democracy and Electoral Infrastructure


White House Watching Google Closely Amid Reports of Election Interference, Trump Says, The Epoch Times.

Tags: GCSC Commissioner James Andrew Lewis.


Former DHS, intelligence leaders launch group to protect presidential campaigns from foreign interference, The Hill.

Tags: GCSC Co-Chair Michael Chertoff.


Exclusive: Critical U.S. Election Systems Have Been Left Exposed Online Despite Official Denials, Motherboard.

Tags: GCSC Call to Protect the Electoral Infrastructure.


Hackers were told to break into U.S. voting machines. They didn’t have much trouble, The Washington Post

Tags: GCSC Norm to Protect the Electoral InfrastructureGCSC Norm to Reduce and Mitigate Significant Vulnerabilities.


Securing the Vote: What it Takes, Insights & Intelligence.

Tags: GCSC Co-Chair Michael Chertoff.


DARPA to Bring its Smart Ballot Boxes to DEF CON for Hacking, DarkReading.

Tags: GCSC Call to Protect the Electoral Infrastructure.


Others


Digital challenges @EuroDIG The Hague, Lindblom Den Haag.

Tags: GCSC Co-Chair Latha ReddyGCSC Commissioner Jeff MossGCSC Commissioner Marietje SchaakeGCSC Commissioner Abdul-Hakeem Ajijola.


Black Hat 2019: What We Expect, PCMag.

Tags: GCSC Commissioner Jeff Moss.


7 must-see talks at Black Hat and DEF CON 2019, CSO.

Tags: Director of the GCSC Secretariat Alexander Klimburg.


#BHUSA: Jeff Moss Talks of Need to Be Better Communicators, InfoSecurity Magazine

Tags: GCSC Commissioner Jeff Moss.


Intellectual Debt: With Great Power Comes Great Ignorance, Medium.

Tags: GCSC Commissioner Jonathan Zittrain.


STEM Education is Not Enough to Aress the Future of Work, Says Global Think Tank, MENAFM.

Tags: GCSC Special Advisor Vint Cerf.


Experts urge for cyber ethics lessons for primary school pupils, The New Paper

Tags: GCSC Commissioner Ilya Sachkov.


Cyberbullying, Trolling & Free Speech: Yasmin Alibhai-Brown, Nigel Inkster, Ella Whelan And Janne Teller Debate, 3QuarksDaily.

Tags: GCSC Commissioner Nigel Inkster.


The age of artificial intelligence: Cities and the AI edge, AsiaOne.

Tags: GCSC Commissioner Isaac Ben-Israel.


The weaponisation of information is mutating at alarming speed, The Guardian.

Tags: Global Commission on the Stability of Cyberspace.


A cyberattack could wreak destruction comparable to a nuclear weapon, The Conversation.

Tags: Global Commission on the Stability of Cyberspace.


What Would Happen If the Whole Internet Just Shut Down All of a Sudden?, Gizmodo.

Tags: Global Commission on the Stability of Cyberspace.


APT41: A Dual Espionage and Cyber Crime Operation, FireEye.

Tags: Global Commission on the Stability of Cyberspace.


Is Chinese technology transforming the Commonwealth?, Institute of Common Wealth Studies.

Tags: GCSC Commissioner Nigel Inkster.


Is Nationalism Threatening the Future of the Internet?, Brink.

Tags: GCSC Commissioner Wolfgang Kleinwächter.


How YouTube Radicalized Brazil, The New York Times

Tags: GCSC Commissioner Virgilio Almeida.


Preliminary Observations on the Utility of Measuring Cybersecurity, Lawfare.

Tags: Global Commission on the Stability of Cyberspace.


Events


23-27 June 2019: Cyber Week, Tel Aviv University.


2-4 July 2019: INTERPOL World 2019, INTERPOL.


16-18 July: RSAC 2019 Asia Pacific & Japan, RSA Conference.


3-8 August 2019: Black Hat USA, Black Hat.


8 August 2019: Cyber Games, Wicked6.


8-11 August 2019: DEF CON 27, DEF CON.


13 August 2019: Securing the Economic Potential of Cyberspace, CEDA.


13-14 August 2019: Cybersecurity Summit: New York City, ISMG.


3 September 2019: Emerging technologies and the international order, ORF.


3 September 2019: Shaping a Blueprint for Inclusive Governance in Cyberspace, GMF.


4-5 September 2019: 14th BISA US Foreign Policy Working Group Annual Conference, BISA.


11 September 2019: Japan’s Response to Cyber Threats: Mega Events and Beyond, Reischauer Center for East Asian Studies.


21-22 September 2019: The Dark and the Digital, Institute of Art and Ideas.


2-3 October 2019: CyberCrimeCon/19, Group-IB.


8-10 October 2019: GFCE Annual Meeting 2019, GFCE.


21-25 October 2019: Cyberweek, CyberScoop.


28-29 October 2019: AI Ethics, Policy, and Governance, Stanford University.


Late October 2019: 6th World Internet Conference Wuzhen Summit, Wuhzen Summit


12-13 November 2019: Paris Peace Forum, PPF