Security

How The Rules Of Cyber Engagement Have Changed

Comment

Image Credits: Bryce Durbin

Monzy Merza

Contributor

Monzy Merza is the chief security evangelist at Splunk.

More posts from Monzy Merza

A series of recent breaches at United Airlines, Anthem and, most recently, Sabre Corp. and American Airlines are reportedly tied to state-sponsored cyber attackers. These attacks further highlight an important trend in the cybersecurity arena: Government entities are targeting corporations in addition to other governments, with far-reaching implications.

While “cyber attack” conjures images of destruction, these attacks are rarely about breaking things and are more often about affecting outcomes. Governments are beginning to use cyber attacks to influence very specific events and gain calculated strategic advantages, e.g., giving one company leverage over another in a competitive bid.

This is uncharted and complex territory from a policy perspective. To make matters worse, corporations currently have few incentives to report and share breach information, meaning these attacks will continue to escalate.

The U.S. government and the private industry are interconnected; this means that hackers can exploit a corporation’s weak security posture as an access point to government information, making these attacks a very real threat to national security.

The New Rules Are Revealed

In May 2014, the first public signs of cyber espionage appeared in the news. The U.S. Justice Department indicted five members of the Chinese military for hacking into computers and stealing valuable trade secrets from leading steel, nuclear plant and solar power firms.

Never before had the U.S. government leveled charges against another government for such crimes as computer fraud, conspiracy to commit computer fraud, damaging a computer, aggravated identity theft and economic espionage.

Eric Holder, U.S. Attorney General at the time, summed up all that was at stake:

“The range of trade secrets and other sensitive business information stolen in this case is significant and demands an aggressive response. Success in the global market place should be based solely on a company’s ability to innovate and compete, not on a sponsor government’s ability to spy and steal business secrets. This Administration will not tolerate actions by any nation that seeks to illegally sabotage American companies and undermine the integrity of fair competition in the operation of the free market.”

Despite his strong statement, protecting U.S. corporations from cyber attacks perpetrated by foreign governments remains an ongoing challenge.

Land, Sea, Air And Cyber

The United States has very specific and clear policies for defense when it comes to the land, the sea and the air, but cyber represents a fourth domain where U.S. policy is still in development. Corporations have raised questions about how the U.S. government can provide adequate assistance in the event of a cyber attack by a foreign government.

Policies must be created in a way that balances privacy and civil liberties. Businesses need legal protections that align with the modern threat landscape. But fashioning those protections presents a significant challenge, most notably rendered in self-disclosure or threat-intelligence-sharing debates.

Eat The Breach

Enterprises targeted by sophisticated attacks are not incentivized to report the breaches. There are no incentives for protections from litigation or fines that encourage companies to self-disclose a breach. A self-reported breach faces the same litigation or fines as a breach detected by law enforcement or discovered by way of publicly leaked documents.

Because there is little incentive from the government to self-report and because companies also risk a loss in consumer confidence and face the potential of backlash in the media, many companies would rather the breach not become public.

Sharing breach information is widely proposed as a means to help enterprises protect against attacks. But a number of companies see little benefit in sharing threat information, as security is seen as a competitive advantage.

Informing a competitor of a potential threat helps the competitor better defend against that same threat. Companies that invest in security are reluctant to give their competitors free threat information.

Finally, there is a stigma that surrounds breaches. A common trend in cyber-breach announcements is the shaming of the victimized organization, especially the organization’s CIO or CISO. Harsh remarks toward the security leadership is commonplace in cyber-breach reports and media discourse. Following a breach report, IT leaders often step down and security teams are demoralized.

State-sponsored breaches are often about gaining a strategic advantage rather than causing damage, making the actual cost of a breach hard to quantify. Rather than spending money on remediation or risk fines and audits or public shaming, many companies simply eat the breach.

Organizations don’t report breaches unless absolutely necessary, e.g., when personally identifiable information is lost. More than likely, the number of breaches perpetrated by foreign government groups is much higher and pervasive than what is reported.

The Path Of Least Resistance

If government attacks on corporations could simply be written off as the price of doing business in the modern world, then enterprises could weigh the cost of a breach versus the cost of investment in security and proceed accordingly. Unfortunately, the situation is not that simple.

Many U.S. corporations produce products and services that are created or discovered after significant financial and time investments. These products and services are part of our economy and our daily lives. A compromised infrastructure or a breached industry affects all of its consumers — the U.S. government and private citizens alike.

Furthermore, the U.S. government is interconnected with the private sector through third-party contracting. When a foreign government launches a cyber attack against a private organization, the ultimate target could still very well be the U.S. government.

The attackers could be picking the weakest security point and working their way to the intended target. If we can’t create clear policies that protect enterprises and incentivize corporations to report and remediate breaches, the attacks will continue to escalate. The ultimate victims in all this are our national security and our strategic interests.

More TechCrunch

Slack is making it difficult for its customers if they want the company to stop using its data for model training.

Slack under attack over sneaky AI training policy

A Texas-based company that provides health insurances and benefit plans disclosed a data breach affecting almost 2.5 million people, some of whom had their Social Security number stolen. WebTPA said…

Healthcare company WebTPA discloses breach affecting 2.5 million people

Featured Article

Microsoft dodges UK antitrust scrutiny over its Mistral AI stake

Microsoft won’t be facing antitrust scrutiny in the U.K. over its recent investment into French AI startup Mistral AI.

1 hour ago
Microsoft dodges UK antitrust scrutiny over its Mistral AI stake

Ember has partnered with HSBC in the U.K. so that the bank’s business customers can access Ember’s services from their online accounts.

Embedded finance is still trendy as accounting automation startup Ember partners with HSBC UK

Kudos uses AI to figure out consumer spending habits so it can then provide more personalized financial advice, like maximizing rewards and utilizing credit effectively.

Kudos lands $10M for an AI smart wallet that picks the best credit card for purchases

The EU’s warning comes after Microsoft failed to respond to a legally binding request for information that focused on its generative AI tools.

EU warns Microsoft it could be fined billions over missing GenAI risk info

The prospects for troubled banking-as-a-service startup Synapse have gone from bad to worse this week after a United States Trustee filed an emergency motion on Wednesday.  The trustee is asking…

A US Trustee wants troubled fintech Synapse to be liquidated via Chapter 7 bankruptcy, cites ‘gross mismanagement’

U.K.-based Seraphim Space is spinning up its 13th accelerator program, with nine participating companies working on a range of tech from propulsion to in-space manufacturing and space situational awareness. The…

Seraphim’s latest space accelerator welcomes nine companies

OpenAI has reached a deal with Reddit to use the social news site’s data for training AI models. In a blog post on OpenAI’s press relations site, the company said…

OpenAI inks deal to train AI on Reddit data

X users will now be able to discover posts from new Communities that are trending directly from an Explore tab within the section.

X pushes more users to Communities

For Mark Zuckerberg’s 40th birthday, his wife got him a photoshoot. Zuckerberg gives the camera a sly smile as he sits amid a carefully crafted re-creation of his childhood bedroom.…

Mark Zuckerberg’s makeover: Midlife crisis or carefully crafted rebrand?

Strava announced a slew of features, including AI to weed out leaderboard cheats, a new ‘family’ subscription plan, dark mode and more.

Strava taps AI to weed out leaderboard cheats, unveils ‘family’ plan, dark mode and more

We all fall down sometimes. Astronauts are no exception. You need to be in peak physical condition for space travel, but bulky space suits and lower gravity levels can be…

Astronauts fall over. Robotic limbs can help them back up.

Microsoft will launch its custom Cobalt 100 chips to customers as a public preview at its Build conference next week, TechCrunch has learned. In an analyst briefing ahead of Build,…

Microsoft’s custom Cobalt chips will come to Azure next week

What a wild week for transportation news! It was a smorgasbord of news that seemed to touch every sector and theme in transportation.

Tesla keeps cutting jobs and the feds probe Waymo

Sony Music Group has sent letters to more than 700 tech companies and music streaming services to warn them not to use its music to train AI without explicit permission.…

Sony Music warns tech companies over ‘unauthorized’ use of its content to train AI

Winston Chi, Butter’s founder and CEO, told TechCrunch that “most parties, including our investors and us, are making money” from the exit.

GrubMarket buys Butter to give its food distribution tech an AI boost

The investor lawsuit is related to Bolt securing a $30 million personal loan to Ryan Breslow, which was later defaulted on.

Bolt founder Ryan Breslow wants to settle an investor lawsuit by returning $37 million worth of shares

Meta, the parent company of Facebook, launched an enterprise version of the prominent social network in 2015. It always seemed like a stretch for a company built on a consumer…

With the end of Workplace, it’s fair to wonder if Meta was ever serious about the enterprise

X, formerly Twitter, turned TweetDeck into X Pro and pushed it behind a paywall. But there is a new column-based social media tool in town, and it’s from Instagram Threads.…

Meta Threads is testing pinned columns on the web, similar to the old TweetDeck

As part of 2024’s Accessibility Awareness Day, Google is showing off some updates to Android that should be useful to folks with mobility or vision impairments. Project Gameface allows gamers…

Google expands hands-free and eyes-free interfaces on Android

A hacker listed the data allegedly breached from Samco on a known cybercrime forum.

Hacker claims theft of India’s Samco account data

A top European privacy watchdog is investigating following the recent breaches of Dell customers’ personal information, TechCrunch has learned.  Ireland’s Data Protection Commission (DPC) deputy commissioner Graham Doyle confirmed to…

Ireland privacy watchdog confirms Dell data breach investigation

Ampere and Qualcomm aren’t the most obvious of partners. Both, after all, offer Arm-based chips for running data center servers (though Qualcomm’s largest market remains mobile). But as the two…

Ampere teams up with Qualcomm to launch an Arm-based AI server

At Google’s I/O developer conference, the company made its case to developers — and to some extent, consumers — why its bets on AI are ahead of rivals. At the…

Google I/O was an AI evolution, not a revolution

TechCrunch Disrupt has always been the ultimate convergence point for all things startup and tech. In the bustling world of innovation, it serves as the “big top” tent, where entrepreneurs,…

Meet the Magnificent Six: A tour of the stages at Disrupt 2024

There’s apparently a lot of demand for an on-demand handyperson. Khosla Ventures and Pear VC have just tripled down on their investment in Honey Homes, which offers up a dedicated…

Khosla Ventures, Pear VC triple down on Honey Homes, a smart way to hire a handyman

TikTok is testing the ability for users to upload 60-minute videos, the company confirmed to TechCrunch on Thursday. The feature is available to a limited group of users in select…

TikTok tests 60-minute video uploads as it continues to take on YouTube

Flock Safety is a multibillion-dollar startup that’s got eyes everywhere. As of Wednesday, with the company’s new Solar Condor cameras, those eyes are solar-powered and use wireless 5G networks to…

Flock Safety’s solar-powered cameras could make surveillance more widespread

Since he was very young, Bar Mor knew that he would inevitably do something with real estate. His family was involved in all types of real estate projects, from ground-up…

Agora raises $34M Series B to keep building the Carta for real estate