Authorarun vishwanath

Cyber security: It’s not just about Yahoo [Published in CNN]

It’s not surprising that some Yahoo users have decided to sue the company for negligence over a 2014 breach that was only recently discovered and announced. But before we blame Yahoo for this, we need to understand how hackers accomplish such breaches — and what all of us should be doing better to prevent such breaches.

The reality is that all of us — individuals, businesses and policy makers — have a role to play in keeping us safe, whether it be engaging in better cyber safety, or passing regulations that ensure the public is notified of breaches so we can respond in a timely fashion.
Hackers wage a sort of asymmetric warfare. Instead of trying to circumvent sophisticated organizational firewalls, most go after soft targets — the employees and customers of the organization. Many use simple spear phishing attacks with hyperlinks that launch spoofed web pages that directly solicit user logins or hide malware in email attachments that provide backdoor access into the organization’s networks. Such attacks are enormously successful, securing victimization rates of close to 30% in some cases — a sobering statistic when one considers that the hacker needs just one victim. Other attacks, such as the hack into the U.K.’s ISP TalkTalk — exploit weaknesses in web forms and access the databases that run behind web pages. Such access is even easier when the hacker has procured the website administrator’s login through spear phishing.
Making all this worse is that hackers using stolen credentials are hard to detect because they appear similar to an employee making legitimate requests. Many lurk in computer network for months, move laterally looking for weaknesses and slowly exfiltrate data to avoid detection. This is likely why it took Yahooalmost two years to discover the breach. And they are not alone. Unfortunately, it takes on average 200 or more days to discover a breach. And although companies are spending more on technological firewalls and employee training, most breaches continue to only be discovered accidentally, when an employee chances on something amiss or, as in the Yahoo case, when the hacker puts the data up for sale.
This gap also makes remediation challenging because knowledge of the breach comes long after the information has been used to victimize users. Meanwhile, organizations are reluctant to admit to breaches because of the negative media attention they receive.
And here’s where Yahoo could have done more: there is speculation they may have learned of the breach in early August. If we hope to stop this, we must begin by realizing that no single company or technological “silver-bullet” can stop a breach. Instead, all of us must work together.
What does that mean in practice?
First, organizations who are the targets of attacks must take the lead by adopting best practices that make it harder for a hacker to enter and move within networks. This need not mean complex, expensive fixes, but simple strategies like the ones outlined by the NSA in its recently published Methodology for Adversary Obstruction. These include policies such as ensuring that administrator accounts do not have Internet access so that sensitive credentials cannot be stolen through spear phishing; using different passwords for users and administrators so hackers cannot move across the network; enforcing multi-factor authentication, which means an additional PIN is sent to another device that needs to be entered and “salting” (adding random data) and encrypting all stored credentials so that passwords are uncrackable even when stolen.
But it is not just up to organizations — every one of us needs to do our bit. This must start with checking if our credentials have been compromised on sites like “Have I been Pwned,” which log stolen credentials, and changing those logins right away. Each of us must work on developing better cyber safety: learning to deal with spear phishing emails; enabling multi-factor authentication where available; using strong, unique passwords and using password-storage vaults; and learning to actively monitor our own devices for suspicious activity so that compromises cannot make their way from our devices to our organization’s.
Finally, policy makers must focus on improving the breach remediation processes. While most states have passed breach notification laws, policies on breach remediation remain open-ended. Simply notifying people or asking victims to change their passwords, as Yahoo just did, or providing people credit protection as Target and others did, does little to contain the damage to one’s reputation stemming from an information leak. Imagine the stigma if the health records of the 80 million victims of the Anthem breach were ever released. Once released, this information becomes available on searchable databases, victimizing people forever. Here, the EU has been more proactive and ruled in favor of a right to be forgotten online, making it possible for EU citizens to prohibit their personal information from appearing on online searches. Perhaps it’s time we considered this, too.
At the end of day, hackers are not after LinkedIn or Yahoo’s data — they are after ours. That means it is our collective responsibility to help protect that data.

A version of this post appeared on CNN: https://www.cnn.com/2016/09/30/opinions/yahoo-data-breach-vishwanath/

Cybersecurity’s weakest link: humans [Published in The Conversation]

There is a common thread that connects the hack into the sluicegate controllers of the Bowman Avenue dam in Rye, New York; the breach that compromised 20 million federal employee records at the Office of Personnel Management; and the recent spate of “ransomware” attacks that in three months this year have already cost us over US$200 million: they were all due to successful “spearphishing” attacks.

Generic – or what is now considered “old school” – phishing attacks typically took the form of the infamous “Nigerian prince” type emails, trying to trick recipients into responding with some personal financial information. “Spearphishing” attacks are similar but far more vicious. They seek to persuade victims to click on a hyperlink or an attachment that usually deploys software (called “malware”) allowing attackers access to the user’s computer or even to an entire corporate network. Sometimes attacks like this also come through text messages, social media messages or infected thumb drives.

The sobering reality is there isn’t much we can do to stop these types of attacks. This is partly because spearphishing involves a practice called social engineering, in which attacks are highly personalized, making it particularly hard for victims to detect the deception. Existing technical defenses, like antivirus software and network security monitoring, are designed to protect against attacks from outside the computer or network. Once attackers gain entry through spearphishing, they assume the role of trusted insiders, legitimate users against whom protective software is useless.

This makes all of us Internet users the sole guardians of our computers and organizational networks – and the weakest links in cyberspace security.

The real target is humans

Stopping spearphishing requires us to build better defenses around people. This, in turn, requires an understanding of why people fall victim to these sorts of attacks. My team’s recent research into the psychology of people who use computers developed a way to understand exactly how spearphishing attacks take advantage of the weaknesses in people’s online behaviors. It’s called the Suspicion, Cognition, Automaticity Model (SCAM).

We built SCAM using simulated spearphishing attacks – conducted after securing permission from university research supervision groups who regulate experiments on human subjects to ensure nothing inappropriate is happening – on people who volunteered to participate in our tests.

We found two primary reasons people are victimized. One factor appears to be that people naturally seek what is called “cognitive efficiency” – maximal information for minimal brain effort. As a result, they take mental shortcuts that are triggered by logos, brand names or even simple phrases such as “Sent from my iPhone” that phishers often include in their messages. People see those triggers – such as their bank’s logo – and assume a message is more likely to be legitimate. As a result, they don’t properly scrutinize those elements of the phisher’s request, such as the typos in the message, its intent, or the message’s header information, that could help reveal the deception.

Compounding this problem are people’s beliefs that online actions are inherently safe. Sensing (wrongly) that they are at low risk causes them to put relatively little effort into closely reviewing the message in the first place.

Our research shows that news coverage that has mostly focused on malware attacks on computers has caused many people to mistakenly believe that mobile operating systems are somehow more secure. Many others wrongly believe that Adobe’s PDF is safer than a Microsoft Word document, thinking that their inability to edit a PDF translates to its inability to be infected with malware. Still others erroneously think Google’s free Wi-Fi, which is available in some popular coffee shops, is inherently more secure than other free Wi-Fi services. Those kinds of misunderstandings make users more cavalier about opening certain file formats, and more careless while using certain devices or networks – all of which significantly enhances their risk of infection.

Habits weaken security

Another often-ignored factor involves the habitual ways people use technology. Many individuals use email, social media and texting so often that they eventually do so largely without thinking. Ask people who drive the same route each day how many stop lights they saw or stopped at along the way and they often cannot recall. Likewise, when media use becomes routine, people become less and less conscious of which emails they opened and what links or attachments they clicked on, ultimately becoming barely aware at all. It can happen to anyone, even the director of the FBI.

 

When technology use becomes a habit rather than a conscious act, people are more likely to check and even respond to messages while walking, talking or, worse yet, driving. Just as this lack of mindfulness leads to accidents, it also leads to people opening phishing emails and clicking on malicious hyperlinks and attachments without thinking.

Currently, the only real way to prevent spearphishing is to train users, typically by simulating phishing attacks and going over the results afterward, highlighting attack elements a user missed. Some organizations punish employees who repeatedly fail these tests. This method, though, is akin to sending bad drivers out into a hazard-filled roadway, demanding they avoid every obstacle and ticketing them when they don’t. It is much better to actually figure out where their skills are lacking and teach them how to drive properly.

Identifying the problems

That is where our model comes in. It provides a framework for pinpointing why individuals fall victim to different types of cyberattacks. At its most basic level, the model lets companies measure each employee’s susceptibility to spearphishing attacks and identify individuals and workgroups who are most at risk.

When used in conjunction with simulated phishing attack tests, our model lets organizations identify how an employee is likely to fall prey to a cyberattack and determine how to reduce that person’s specific risks. For example, if an individual doesn’t focus on email and checks it while doing other things, he could be taught to change that habit and pay closer attention. If another person wrongly believed she was safe online, she could be taught otherwise. If other people were taking mental shortcuts triggered by logos, the company could help them work to change that behavior.

Finally, our method can help companies pinpoint the “super detectors” – people who consistently detect the deception in simulated attacks. We can identify the specific aspects of their thinking or behaviors that aid them in their detection and urge others to adopt those approaches. For instance, perhaps good detectors examine email messages’ header information, which can reveal the sender’s actual identity. Others earmark certain times of their day to respond to important emails, giving them more time to examine emails in detail. Identifying those and other security-enhancing habits can help develop best-practice guidelines for other employees.

Yes, people are the weakest links in cybersecurity. But they don’t have to be. With smarter, individualized training, we could convert many of these weak links into strong detectors – and in doing so, significantly strengthen cybersecurity.

A version of this post appeared here and on other leading media: https://theconversation.com/cybersecuritys-weakest-link-humans-57455

Why we need a cyber wall [Published in CNN]

Donald Trump had the audience at his rally in California on Thursday chanting “build that wall,” a reference to his pledge to build one along America’s southern border. But while this pledge might not be in the country’s best interests, there is actually somewhere that we really could use a wall: cyberspace.

After all, this is where most of us spend much of our time these days. And it’s also where all manner of criminals — from “hacktivists” to state-sponsored espionage units — lurk. Cyber attacks have already breached many major corporations, infrastructure facilities and military installations. And by now, every one of us has probably been targeted in some way, some of us repeatedly.
All this is costing governments and individuals enormous amounts every year. One study estimated the cost to the global economy from cybercrime at more than $400 billion each year, a figure that is only likely to rise as more and more transactions are conducted online. But there is a way to stop many of these attacks, one that requires shoring up a fundamental weakness of the Internet that hackers exploit: the mechanism used by computer systems for authenticating users.
In the real world, authenticating someone is easily done by checking something the person already has — a credit card, a driver’s license, a passport — to serve as irrefutable proof of their identity.
Online transactions, however, rely on a system of credentialing, usually someone entering a login and password combination that only they are supposed to know. There is nothing the user can show that can serve as definitive proof of identity, meaning if anyone else uses these credentials, there is virtually no way of distinguishing them from the legitimate person.
As a result, the vast majority of cyber attacks are attempts to steal credentials, either directly from people or indirectly from the servers of organizations storing this information. What we need instead is an online mechanism for authenticating users that is founded on some real-world identifiers that would essentially create a virtual wall against hackers. This is precisely what Estonia, today one of the most technologically progressive nations in the world, successfully did.
When it gained independence from the Soviet Union, many Estonians didn’t even have a phone line, let alone a mobile phone. However, the newly formed government leapfrogged the usual development steps through a series of technologically progressive initiatives that brought its entire business, communication and governance systems online.

To prevent stolen credentials from undermining these, the government implemented a “Public Key Infrastructure” (PKI), basically a nationwide electronic ID card with an encrypted key that securely identifies users to servers online. Swiping the card in addition to entering login credentials works like a real-world authentication system, where individuals present their credentials along with something only they can possess.

Thanks to this, Estonia’s 1.3 million citizens can do everything from file taxes to fill their prescriptions, sign contracts, and even vote online — confident that no one is impersonating them. This has led to significant savings, such as tax returns being processed in less than two days, and has also spurred tremendous innovation, with companies such as Skype and TransferWise among the numerous tech start-ups that begin there each year.
While other European nations have followed Estonia’s lead, attempts in the United States, some dating back to the mid-1990s, remain stymied by our nation’s size and a pervasive distrust in government-led centralization. But there might be a solution, one that utilizes a unique identifier but does not involve the government: our cellphones.
Virtually every one of us has a mobile phone, and not only are our phone numbers tied to our credit history — and by extension, our identity — but many mobile services also support SIM cards that can store encrypted data. Furthermore, many of today’s handsets require biometrics like fingerprints for access, making it impossible to use them without authorization.
Thus a PKI could be linked to a specific cellphone number we choose, in the way the popular app WhatsApp does. This system could be developed by mobile service providers like Verizon or AT&T, who cover most of the nation’s users, or by handset makers like Apple and Samsung, whose mobile payment solutions could further benefit from such authentication.
Of course, although the development of a PKI would create a significant hurdle for hackers, it still won’t protect users who are careless about their devices. Nor can it protect users who click on malware-laden spearphishing emails that open back doors into computers, completely circumventing the hacker’s need for user credentials. The reality is that all Internet users — the weakest links in cyber security — will need to lay the final brick in the virtual wall.
How?
For a start, by learning how to spot and report suspicious phishing emails. Whenever possible, we should also enable security protections such as two-factor authentication — an analogue to PKI, where users are sent a pin-number to any phone or device they choose, to be entered during login. And more generally, we can develop better “cyber hygiene”. This means adopting cyber safe behaviors such as using online password vaults to store and create complex passwords, using separate email accounts for important logins, and using a secure browser rather than email client to log into these accounts.
Regardless of who ultimately wins the presidency, protecting cyberspace must be a priority. And it will require a wall not of bricks and barbed wire, but a virtual one that we all help build, using our ingenuity, leveraging technology, and developing better habits in cyber space.

*A version of this post pear on CNN: https://www.cnn.com/2016/05/02/opinions/build-cyber-wall-vishwanath/

Time to rethink apps security [Published in CNN]

Even Steve Jobs could not see the potential of third-party mobile apps: those little software programs that turned our mobile phones into smartphones. Jobs had famously argued against such apps, instead advocating for the use of mobile web pages that could be accessed using iPhone’s Safari browser. It reportedly wasn’t until users began jail-breaking and creating third-party apps anyway — literally reinventing the iPhone — that he came around to the idea and launched the official Apple App Store in 2008.

Fast forward to 2016, and today across Apple, Google, Microsoft, Amazon and Blackberry’s app marketplaces there are more than 3 million mobile apps, which have been downloaded billions of times by users all over the world. Apps have been developed for everything from turning a phone’s camera flash into a flashlight to controlling household thermostats and baby monitors. There are even apps for flying drones, and one day we will likely use an app to drive our cars.
Not surprisingly, apps are among the primary reasons people buy phones. Having an app store with many third-party apps is vital for the success of a platform, as Microsoft and Amazon‘s struggle for mobile market share has shown us. And a single app can dictate the very existence of an OS, as Facebook’s recent decision to stop supporting BlackBerry’s OS will most likely show.
But there are downsides to apps that most of us seldom consider. For one, apps collect an unprecedented amount of user information, often much more data than the app requires or the user knowingly authorizes. For instance, the Facebook app, besides tracking personal information, also collates the search terms we enter and the locations from where we connect. Many apps share this information with search engines and third party advertisers, which is the reason many of us see those online advertisements that appear to follow us on online, presenting things for sale based on search terms we entered on another website.
Another issue is that many mobile apps are developed by amateur programmers, who are not always knowledgeable about information security. Often, these apps leak sensitive user information to other platforms, or worse yet, willfully steal information. Some other apps, including one in three major banking apps recently tested, continue to be just poorly designed and transmit user information to external servers using unencrypted formats that make it easy for hackers to steal this information during transit.
In addition, most mobile apps are designed to accommodate cellular data caps and optimize limited smartphone screen sizes. To achieve this, app designers focus on presenting only the information they deem necessary, often stripping out information that is valuable from an information security standpoint. For instance, most mobile email apps do not display the email’s message header — a critical source of information about the mail servers and protocols used to route the email, which could reveal whether it is a phishing email. Likewise, mobile browsers often conceal the complete URL of web pages to make viewing easier, while many mobile apps just don’t display security indicators — such as the SSL padlock symbol — that signals that a transaction is encrypted and secure.
Unfortunately, most users are unaware of these issues, and those who are aware have limited options other than not downloading apps. Fixing these requires the owners of the mobile platforms — Apple, Google, Amazon, Microsoft — who directly benefit by selling phones, advertisements and products to users, to proactively influence the designers of apps. It’s the app stores that then hold the key to securing our privacy, because with great apps also comes greater responsibility toward all of us.
How can we make this happen?
First, app designers must become more security conscious in their design. App stores can foster this by creating design standards and mandating privacy disclosures. A step in that direction would be to require all apps to display exactly what user information they collect as well as who they share it with. Just like most phones today have a battery app that reveals how much power different apps are draining, mobile platforms could also develop a privacy tool that displays what data individual apps are mining and flags apps that are, without authorization, porting sensitive user information.
Second, with apps being developed for everything from remotely starting our cars to soon driving them, why not also create a system for app security testing similar to the 5-star rating system we use to test the crash protections of new cars. Just like the Insurance Institute for Highway Safety does automobile crash testing, an independent cybersecurity organization could take on the responsibility of testing and rating the security of apps as well as the gadgets they control. Alternatively, app stores could develop such a rating system by using beta-testers who collectively rate each app and provide star security ratings that are then displayed in the stores.
It goes without saying that without app stores there would be none of those great apps we all love. And without us purchasing apps and phones, there would be no app store. So ultimately, consumers hold the power to influence app and gadget designs. We can do this by downloading secure browsers and choosing to use mobile websites instead of leaky apps, by using anti-malware protections and virtual private networks that encrypt mobile data, and by using privacy apps that reveal how much of our personal information each app is using, sharing and porting.
Just like the first wave of jail-broken phones led to the App Store, we can influence the design of apps so they focus on protecting us.
We can and we must. After all, this is our personal information they are monetizing.

*A version of this post appeared on CNN: https://www.cnn.com/2016/04/01/opinions/problem-app-security-vishwanath/index.html

Is 2016 the year of online extortion?[Published in CNN]

his week, a hospital in western Kentucky was the latest organization to fall victim to a “ransomware” attack — a class of malware that encrypts all the files on a computer, only releasing them when a ransom is paid to the hacker holding the encryption key.

In this case, the hospital did not pay up. However, other hospitals, law firms, small businesses and everyday citizens have already paid anywhere from $200 to $10,000 in ransoms. Indeed, based on complaints received between April 2014 and June 2015, the FBI estimated that losses for victims from just one of these malware strains were close to $18 million.
Sadly, this year could well be worse.
Ransomware has existed for some time, the earliest dating back to the late 1980s. Back then, most was developed by enthusiasts — individuals testing out their skills. In contrast, today’s ransomware is often developed by global software teams that are constantly updating their codes to evade anti-virus software and selling them as off-the-shelf products.
Already, newer strains appear capable of infecting mobile devices, of encrypting files stored on cloud servers through mapped, virtual drives on computers, and of transitioning to the “Internet of Things” — infecting gadgets like watches and smart TVs that are going online. In the near future, the likelihood of an attack locking us out of our car, or worse yet in it, while we drive, demanding an immediate ransom, is becoming increasingly possible.
Thanks to the Internet, this malware-for-hire is available to virtually anyone, anywhere with criminal intent. Making things easier for hackers is the availability of Bitcoins, the online currency that makes monetary transactions untraceable. And making things even easier for them is our inability to stop spear phishing — those innocuous looking emails whose attachments and hyperlinks conceal the malware.

All this makes anyone with minimal programming skills and a free email account capable of inflicting significant damage, and with everyone from presidents to pensioners using emails today, the virtual pool of potential victims is limitless. No surprise then that cybersecurity experts believe that 2016 could well be the “Year of Online Extortion.”

But we can stop these insidious attacks, if everyone — individuals, organizations and policy makers — works towards a solution.
First, everyone must be taught to spot, sequester, and deal with spear phishing emails. This requires cybersecurity education that is free and widely available, which is presently not the case. While different training programs exist, most cater to large organizations, and are outside the reach of households, senior citizens and small businesses, who remain vulnerable.
What we also need is training that helps people develop better “cyber hygiene.” This includes teaching people to frequently update anti-virus software, appropriately program firewalls, and routinely back up their computers on discs that are then disconnected from the network. In addition, people should be taught how to deal with a ransomware attack and stop its spread by quickly removing connected drives and disconnecting from the Internet.
Second, organizations must do more to protect computer networks and employees. Many organizations continue to run legacy software, often on unsupported operating systems that are less secure and far easier for hackers to infiltrate. Nowhere is this problem more pressing than in small businesses, health care facilities, and state and federal government institutions, which is why they are the sought-after targets of ransomware.
Besides updating systems, organizations need to overhaul the system of awarding network privileges to employees. The present system is mostly binary, giving access to employees based on their function or status in the organization. Instead, what we need is a dynamic network-access system that takes into account the employees’ cyberrisk behaviors, meaning only employees who demonstrate good cyber hygiene are rewarded with access to various servers, networks, and programs through their devices.
Finally, policy makers must work to create a cyber crime reporting and remediation system. Most local law enforcement today is ill-equipped to handle ransomware requests, and harried victims usually have limited time to comply with a hacker’s demand. Many, therefore, turn to their family and friends, who themselves have limited expertise. Worse yet, some have no choice but to turn to the hacker, who in many cases provides a chat window to guide the victim through the “remediation” process.
What we urgently need is a reporting portal that is locally available and staffed by cybersecurity professionals, so people can quickly report a breach and get immediate support. Such a system currently exists, in the form of the existing 311 system for reporting nonemergency municipal service issues. It’s a system that has already been adopted by many cities in the nation, and allows for reporting via email, telephone, and smartphone apps. Strengthening this system by providing it the necessary resources to hire and train cyber security professionals, could go a long way towards stopping ransomware attacks that are now making their way past Main Street to everyone’s homes.
Perhaps the best way to look at the problem is this: How safe would we feel in a city where people are routinely being held hostage? Well, cyberspace is our space. And we have to make it safe.

A version this post appeared on CNN: https://www.cnn.com/2016/03/25/opinions/preventing-ransomware-attacks-vishwanath/

Apple, want to show you really care? Protect us from everyday hacking [Published in CNN]

Tuesday at the first congressional hearing on the issue of iPhone encryption, Apple’s general counsel argued against the FBI’s call for creating a backdoor into the company’s technology, a door that could allow the government — and hackers — to intrude on our privacy in the future.

Apple CEO Tim Cook’s position — supported by everyone from Google to Facebook, Microsoft, and Amazon — resonates with us because of we worry about “Big Brother” and “government surveillance.” But while many users are expressing solidarity with Apple’s apparently principled stance, they might also be asking a serious, related question for themselves: Does Apple really do enough to protect users from hackers?
Apple’s App Store Terms and Conditions clearly absolves it from any responsibility for a hack, breach, or data loss stemming from the use of any apps you purchase from it.
Imagine one of the apps you used to say, edit pictures, store passwords, or track your health was breached and the information was made public — similar to how hacked pictures from celebrity iCloud accounts were released. Only this time, imagine that it was due to an app in the Apple store being compromised — something that we know is probable after the recent discovery of hundreds of malware infected apps on Apple’s app store. If this happens, we the users have literally no one we can hold responsible.
In light of this, it’s hard to make a case then that Apple is always looking out us. Can’t Apple do better in protecting us from hackers?
Before we discuss that, let’s pause to recognize that this is a problem not just with Apple but also every other major technology company, from Google to Facebook to Amazon, each of which is vying to become your gateway to the Internet.
And the problem is likely to get worse as more and more everyday products become part of the “Internet of Things” (IoT) — that is, cyberspace connecting every “thing” (like clothes, thermostats, watches, and cars) to each other — all managed and controlled by devices like Apple’s iPhone, Amazon’s Echo, or Google’s Android platform.
Already the so-called sandboxed ecosystems of mobile operating systems — where only approved apps are given limited access to their respective operating system resources — have been shown to be susceptible to hacks by other apps that do not have the same access authorizations.
Such issues are only likely to get worse as more IoT gadgets come online and as more information is shared by “situationally aware,” decision engines like Siri, Alexa, and Google Now, which need to know everything we do on different apps throughout the platform in order to belt-out those smart responses to our queries.
Further complicating this is that most IoT gadgets are created by companies that have little to no information security experience, or that are simply negligent. Many have been shown to have serious vulnerabilities, and we have already seen successful breaches into everything from “smart” toys to thermostats.
In between all this, we, the users, are left to fend for ourselves. Often breaches remain unreported, or even undetected. Many security flaws are found by security enthusiasts or accidentally stumbled upon by affected consumers, sometimes months after a breach. Worse yet, many users are oblivious to the problem and continue to use these gadgets. Why? Because there exists no single gateway to learn about the security of new products outside of the online feedback from other users, most of who have little technical understanding of security.
But there is something that companies like Apple and Amazon can do. And they could do it now.
First, iOS and Android operating systems have specific technical guidelines for app developers, but these are designed to protect their operating systems, not our data, from being “exfiltrated” — taken without our consent — out of a gadget that connects through the app. Here, technology companies like Apple and Amazon act as mere intermediaries that provide their platforms for exchanging products. Instead, such technology companies should create and mandate security standards that gadget makers must adhere to, providing standards of protection for all of us.
Second, app stores today function merely as software purchasing outlets. All they present is user feedback about an app’s functionality without communicating its security flaws or those of gadgets connected to or controlled by the app. This could be easily altered if companies like Amazon actively solicited more pointed feedback from users about apps and the products they connect to and about the types of security issues they have considered or encountered. Not only would this help all of us purchase safer technologies, but it would also shape our expectations about what we should be looking for when we purchase IoT gadgets and apps.
Third, a consortium of technology companies, including Apple, Facebook, and Amazon must develop a security rating system and a standardized system for displaying this information, much like we have star-rating systems for automobiles and warning labels on products. The system should be easy for the end user to understand, should proactively rate new gadgets and apps as they are introduced, and these ratings should be prominently displayed on the app stores and product packages. All technology users, no matter their technical competency, should have this quick way to assess the security implications of the devices they plan to purchase.
It is one thing for Apple to take a stance against government intrusions into our privacy, but it is another to do something to better protect our data from hackers.
  • A version of this post appeared on CNN: https://www.cnn.com/2016/03/02/opinions/can-apple-protect-us-from-hacking-vishwanath/index.html

When hackers turn your lights off [Published in CNN]

Cybersecurity was in the news again this week as hackers released contact details of thousands of FBI and Homeland Security employees after claiming to have taken 200 GB of data from Department of Justice computers. But even as such breaches have started to feel almost routine, they are also taking a more troubling turn.

Imagine traffic being halted, subway trains going berserk, furnaces and cooling systems firing out of control, or worse yet, a nuclear power plant melting down — all due to a cyberattack. This is by no means a hypothetical concern. The first wave of infrastructure attacks has already demonstrated the harm that can be done as governments face the reality that the hacking threat is increasingly about more than stolen information.
Late last year, in a first of its kind, a major cyberattack crippled Ukraine’s electricity grid, freezing the computer terminals of operators trying to restart the grid and blocking the telephone lines so consumers couldn’t call in. Last month, Israel’s Public Utility Authority was reportedly attacked. And Germany reported extensive damage to an industrial plant from a hacked blast furnace that couldn’t be stopped.
Closer to home, the Department of Homeland Security received reports of close to 250 infrastructure incursions in fiscal 2014, while Iranian hackers in December 2013 reportedly infiltrated the sluice gate controllers of the Bowman Avenue Dam in Rye, New York.
The potential losses in terms of time, money and possibly even lives from increasingly sophisticated attacks are hard to calculate. But one thing is clear: These attacks can only be stopped if we enlist the help of every Internet user.
And there is a good reason to follow this approach, because although cyberattacks weave their way through computer networks in different ways, there is a common thread that runs across many of them — something that we could exploit to stop them.

First, for efficiency reasons, many cyberattacks utilize the same attack pattern. From the attack on the Justice Department to the one crippling Ukraine, most utilize spear phishing.

The hacker hides a malware payload in the attachment of an email, which when clicked opens a back door into computer networks that are then used to hijack system controllers or extract data. Some phishing attacks direct individuals to fraudulent websites that run malicious scripts or directly solicit login and other credentials by spoofing a real website. Such attacks are often repeated, with minor changes to the request; many even carry the same payload or direct people to the same phony website.
A second important aspect of cyberattacks is that not all the attacks are successful. In fact, targeted spear-phishing attacks tend to have success rates ranging from 30% to 55%. So while many people fall prey to the attack, many more don’t — and a breach could be stopped by just one person reporting it.
With that in mind, if we could provide a mechanism for the many individuals who detect an attack to report it, and if we could quickly disseminate the information to its likely targets, we could stop most attacks from spreading.
But the problem today is that there are many different agencies that collect cyberbreach reports. For example, anyone receiving a spear-phishing email claiming to be from the IRS can report it to the IRS, to the state attorney general, the local police, and the IT department of their organization. Other entities that could be reported to include the Anti Phishing Work Group and the FBI’s Internet Crime Complaint Center. Each of these organizations allows for reporting using different forms and mechanisms, with some merely collecting reports, others providing emailed feedback, and some others having investigative authority. This is a problem for the average person, whose report is the first line of defense against the attack.
What we need instead is a simple, one-stop, city- or county-level solution: one that is well-publicized, so everyone in a region can be easily made aware of this service; one that is convenient and allows for reporting using a variety of mechanisms; and one that not only collects fraud information but also disseminates information about how to protect and, if necessary, remediate the breach, so people can get localized help.
What would such a system look like in practice? In fact, many cities throughout the nation already have one system in place that we could potentially leverage: the 311 system for reporting nonemergency municipal service issues. This system has been adopted by more than 60 cities and provides a ready platform for cyberbreach reporting. In many areas, the system allows for complaints via email, phone, and smartphone. Leveraging the existing 311 system is therefore convenient and has the added advantage that the system is already known in most areas.
Of course, the current systems would need to be strengthened by adding staff with expertise in dealing with cyberattacks. But this could be easily accomplished by transferring some resources from fighting traditional crime — which in much of the nation remains at an all-time low — toward fighting the exponentially growing problem of cybercrime.
Reports from various regional 311 systems could then be aggregated by an agency like the FBI’s IC3, providing a means for centralized tracking and attack containment. In much the same way the Centers for Disease Control and Prevention protects public health in the United States, many cyberoutbreaks could be stopped before they crippled our homes or our critical infrastructure — if people reported them early, if their likely victims were warned about them, and if law enforcement began to remedy them right away.
The democratized Internet gives everyone a voice. But it also makes just about anyone capable of inflicting massive damage. We need everyone’s help to protect this increasingly wired world we live in.

A version of this post appeared on CNN: https://www.cnn.com/2016/02/11/opinions/cyber-infrastructure-attacks-vishwanath/

When hackers turn your lights off [Published in CNN]

Cybersecurity was in the news again this week as hackers released contact details of thousands of FBI and Homeland Security employees after claiming to have taken 200 GB of data from Department of Justice computers. But even as such breaches have started to feel almost routine, they are also taking a more troubling turn.

Imagine traffic being halted, subway trains going berserk, furnaces and cooling systems firing out of control, or worse yet, a nuclear power plant melting down — all due to a cyberattack. This is by no means a hypothetical concern. The first wave of infrastructure attacks has already demonstrated the harm that can be done as governments face the reality that the hacking threat is increasingly about more than stolen information.

Late last year, in a first of its kind, a major cyberattack crippled Ukraine’s electricity grid, freezing the computer terminals of operators trying to restart the grid and blocking the telephone lines so consumers couldn’t call in. Last month, Israel’s Public Utility Authority was reportedly attacked. And Germany reported extensive damage to an industrial plant from a hacked blast furnace that couldn’t be stopped.

Closer to home, the Department of Homeland Security received reports of close to 250 infrastructure incursions in fiscal 2014, while Iranian hackers in December 2013 reportedly infiltrated the sluice gate controllers of the Bowman Avenue Dam in Rye, New York.

The potential losses in terms of time, money and possibly even lives from increasingly sophisticated attacks are hard to calculate. But one thing is clear: These attacks can only be stopped if we enlist the help of every Internet user.

And there is a good reason to follow this approach, because although cyberattacks weave their way through computer networks in different ways, there is a common thread that runs across many of them — something that we could exploit to stop them.

First, for efficiency reasons, many cyberattacks utilize the same attack pattern. From the attack on the Justice Department to the one crippling Ukraine, most utilize spear phishing.

The hacker hides a malware payload in the attachment of an email, which when clicked opens a back door into computer networks that are then used to hijack system controllers or extract data. Some phishing attacks direct individuals to fraudulent websites that run malicious scripts or directly solicit login and other credentials by spoofing a real website. Such attacks are often repeated, with minor changes to the request; many even carry the same payload or direct people to the same phony website.

A second important aspect of cyberattacks is that not all the attacks are successful. In fact, targeted spear-phishing attacks tend to have success rates ranging from 30% to 55%. So while many people fall prey to the attack, many more don’t — and a breach could be stopped by just one person reporting it.

With that in mind, if we could provide a mechanism for the many individuals who detect an attack to report it, and if we could quickly disseminate the information to its likely targets, we could stop most attacks from spreading.

But the problem today is that there are many different agencies that collect cyberbreach reports.

For example, anyone receiving a spear-phishing email claiming to be from the IRS can report it to the IRS, to the state attorney general, the local police, and the IT department of their organization. Other entities that could be reported to include the Anti Phishing Work Group and the FBI’s Internet Crime Complaint Center. Each of these organizations allows for reporting using different forms and mechanisms, with some merely collecting reports, others providing emailed feedback, and some others having investigative authority. This is a problem for the average person, whose report is the first line of defense against the attack.

What we need instead is a simple, one-stop, city- or county-level solution: one that is well-publicized, so everyone in a region can be easily made aware of this service; one that is convenient and allows for reporting using a variety of mechanisms; and one that not only collects fraud information but also disseminates information about how to protect and, if necessary, remediate the breach, so people can get localized help.

What would such a system look like in practice? In fact, many cities throughout the nation already have one system in place that we could potentially leverage: the 311 system for reporting nonemergency municipal service issues. This system has been adopted by more than 60 cities and provides a ready platform for cyberbreach reporting. In many areas, the system allows for complaints via email, phone, and smartphone. Leveraging the existing 311 system is therefore convenient and has the added advantage that the system is already known in most areas.

Of course, the current systems would need to be strengthened by adding staff with expertise in dealing with cyberattacks. But this could be easily accomplished by transferring some resources from fighting traditional crime — which in much of the nation remains at an all-time low — toward fighting the exponentially growing problem of cybercrime.

Reports from various regional 311 systems could then be aggregated by an agency like the FBI’s IC3, providing a means for centralized tracking and attack containment. In much the same way the Centers for Disease Control and Prevention protects public health in the United States, many cyberoutbreaks could be stopped before they crippled our homes or our critical infrastructure — if people reported them early, if their likely victims were warned about them, and if law enforcement began to remedy them right away.

The democratized Internet gives everyone a voice. But it also makes just about anyone capable of inflicting massive damage. We need everyone’s help to protect this increasingly wired world we live in.

  • A version of this post appeared on CNN: https://www.cnn.com/2016/02/11/opinions/cyber-infrastructure-attacks-vishwanath/

Why the cyber attacks keep coming [Published in CNN]

Last week, we learned that hackers allegedly working for the Chinese government breached personal information of some 4 million current and former federal employees. This latest episode is shocking in its scope, but security experts have long known about China’s military-level cyberoffensive capabilities, with reports of an entire division of its army being devoted to cyberattacks.

And China is not alone. Russian government-sponsored hackers were blamed for the recent breach of the White House’s email system; North Korean hackers were believed to be behind the Sony Pictures’ hack. And state actors aside, there are also nonstate criminal enterprises and a smorgasbord of “hactivists” all focused on breaching, stealing or releasing compromised information. In fact by merely cumulating the number of successful breaches since 2014 we reach a sobering conclusion: All of us, by now, have been the victims of a cyberattack of one kind or another.

How are these attacks happening?

The vast majority of these hacks utilize simple phishing attacks — hackers craft emails that appear to come from a trusted source such as the Internal Revenue Service or a company’s information technology department with an innocuous-looking hyperlink or attachment that, once clicked, opens virtual backdoors into the individual’s computer. Once compromised, requests appear to come from inside the organization’s computer networks, which make them hard to detect using security software programmed to protect networks from outside incursions, not insider requests. This is why it is virtually impossible to stop cyberattacks — because we are the ones who inadvertently open these emails and click on the links. We act as the unintentional insiders who hand over the keys to the network.

To have any chance of halting cyberattacks, we need to understand why people click on phishing links in the first place. There are two main reasons:

The first stems from how we relate to network security. Most of us who don’t work as IT administrators see network security as an impediment to getting work done. After all, our organizational performance is seldom measured in terms of how safe we are or how many rules we follow. Consequently, many of us disregard warnings, circumvent rules and connect in places we shouldn’t, oftentimes using unauthorized devices and software. Supporting such actions are mistaken beliefs about the security of certain operating systems, devices and file-formats that lead many people to be cavalier about what sites they visit and what they open on certain devices.

The second problem stems from people’s cyber habits, where many online actions such as checking emails and texting have become so routine that people are often unaware of when they perform these behaviors. As a result, many people quickly open emails or mindlessly click on links and attachments with nary a thought of its consequences. Smartphones, which the majority of us now use to connect to the Internet, have further exacerbated the problem by making it possible for people to check email frequently while simultaneously being engaged in a number of other activities. Smartphone apps and screen sizes also restrict how much information is presented, which can make it difficult to check the veracity of an email even if one is so inclined.

With all this in mind, fixing the people problem of cybersecurity is going to require a three-pronged approach.

First, we must educate people on how to protect themselves better online. Cybersecurity education must be accessible, universal and a mandatory part of K-12 education. It must focus on teaching people safe browsing habits, replace flawed cyber beliefs with objective knowledge and teach people ways to protect their information online better — in short, it must help them develop better cyber hygiene.

Second, we must train people on how to spot a fraudulent email quickly, on strategies for effectively sequestering it and on replacing poor cyber habits with better ones. Hand in hand with this, we must also work on developing a more dynamic system of according IT-access privileges to people in organizations. The current system was developed when computers were newer, software limited and devices fewer. Today we need a system that is not too restrictive, one that takes into account people’s varying device use needs but also fosters security consciousness. One solution might be to provide people access based on their cybersecurity behaviors, risk beliefs and online habits rather than merely on who they are in the organization.

Finally, we must make it easy for people to report suspected breaches and malicious emails. Efforts by President Barack Obama to make the reporting of data breaches mandatory for organizations are a good step, but there is a pressing need to establish a national clearinghouse where people can quickly report a breach and find help. The current system requires individuals to sift through a host of law enforcement agency websites to find a contact to report a breach, and oftentimes there is little to no feedback or remedial help in return, which reduces people’s motivation to report.

Instead, we need to create a single, centralized agency, similar perhaps to the Action Fraud center and specialized FALCON response team that police in London have created, where people can both report a breach and find someone who can immediately redress it.

Ultimately, this latest attack was likely successful because we are the weakest links in the nation’s cyber infrastructure. Technology alone cannot fix this problem — only we can stop the next attack. And it’s likely already underway.

*A version of this post appeared in CNN: https://edition.cnn.com/2015/06/08/opinions/vishwanath-stopping-hacking/

Who is to blame for cyberattacks? [Published in The Conversation]

The theft of 80 million customer records from health insurance company Anthem earlier this month would be more shocking if it were not part of a larger trend. In 2013, the Department of Defense and some US states were receiving 10–20 million cyberattacks per day. By 2014, there was a 27% increase in successful attacks, culminating with the infamous hack of Sony Pictures.

Much of the media focus is on the losses rather than the process by which such breaches take place. Consequently, instead of talking about how we could stop the next attack, people and policymakers are discussing punitive actions. But not enough attention is given to the actions of individual end users in these cyberattacks.

We are the unintentional insiders

Many of these hacking attacks employ simple phishing schemes, such as an e-card on Valentine’s Day or a notice from the IRS about your tax refund. They look innocuous but when clicked, they open virtual back doors into our organizations.

It is you and I who click on these links and become the “unintentional insiders” giving the hackers access and helping spread the infection. Such attacks are hard to detect using existing anti-virus programs that, like vaccines, are good at protecting systems from known external threats — not threats from within.

Clearly, this virtual battle cannot be won using software alone. In the same way personal hygiene stymies the spread of infectious disease, fixing this cyber quandary will require all of us to develop better cyberhygiene. We need to begin by considering the cyberbehaviors that lead to breaches.

My research on phishing points to three. Firstly, most of us pay limited attention to email content, focusing instead on quick clues that help expedite judgment. A picture of an inexpensive heart-shaped valentine gift gets attention, oftentimes at the cost of looking at the sender’s email address.

This is coupled by our ritualized media habits that our always-on and accessible smartphones and tablets enable. Many of us check emails throughout the day whenever an opportunity or notification arises, even when we know it is dangerous to do so, such as while driving. Such habitual usage significantly increases the likelihood of someone opening an email as matter of routine.

And finally, many of us just aren’t knowledgeable about online risks. We tend to hold what I call “cyber risk beliefs” about the security of an operating system, the safety of a program, or the vulnerability of an online action, most of which are flawed.

Cleaning up our cyberhygiene act

Developing cyberhygiene requires all of us — netizens, educators, local government, and federal policymakers — to actively engage in creating it.

To begin, we must focus on educating everyone about the risks of online actions. Most children don’t learn about cybersafety until they reach high school; many until college. More troublingly, some learn through risky trials or the reports of someone else’s errors.

In an age where online data remain on servers perpetually, the consequences of a privacy breach could haunt a victim forever. Expanding federal programs such as the National Initiative for Cybersecurity Education, which presently aims to inspire students to pursue cybersecurity careers, could help achieve universal cybersecurity education.

Second, we must train people to become better at detecting online fraud. At the very least, all of us must be made aware of online security protocols, safe browsing practices, secure password creation and storage, and on procedures for sequestering or reporting suspicious activity. Flawed cyber-risk beliefs must be replaced with objective knowledge through training.

Although some training programs address these issues, most target businesses that can pay for training. Left out are households and other vulnerable groups, which, given the recent “bring your own device to work” (BYOD) trend, increases the chances that a compromised personal device brings a virus into the workplace. Initiatives such as the Federal Cybersecurity Training Events that presently offer free workshops to IT professionals are steps in this direction, but the emphasis must move beyond training specialists to training the average netizen.

Finally, we must centralize the reporting of cyber breaches. The President’s proposed Personal Data Notification and Protection Act would make it mandatory for companies to report data breaches within 30 days. But it still doesn’t address who within the vast network of enforcement agencies is responsible for resolution. Having a single clearing house that centralizes and tracks breaches, just like the Centers for Disease Control and Preventiontracks disease outbreaks across the nation, would make remediation and resource allocation easier.

Across the Atlantic, the City of London Police created a system called Action Fraud, which serves as a single site for reporting all types of cyberattacks, along with a specialized team called FALCON to quickly respond to and even address impending cyberattacks. Our city and state police forces could do likewise by channeling some resource away from fighting offline crime. After all, real world crime is at a historically low rate while cybercrimes have grown exponentially.

*A version of this post appeared here and in other leading media outlets: https://www.weforum.org/agenda/2015/02/who-is-to-blame-for-cyberattacks/