Cyber-extortion on the rise, warns Schneier

Cyber-extortion on the rise, warns Schneier

Summary: Noted security expert, Bruce Schneier, has declared that cyber-extortion is on the rise, but has warned importantly that it mainly affects "fringe" industries such as online gambling, rather than critical national infrastructure and other major organisations.

SHARE:
TOPICS: Security
0

Noted security expert, Bruce Schneier, has declared that cyber-extortion is on the rise, but has warned importantly that it mainly affects "fringe" industries such as online gambling, rather than critical national infrastructure and other major organisations.

Schneier wrote in a blog post on Tuesday that the security company he founded, Counterpane, has seen proof of attack capability followed by extortion demands -- but said the attacks he had seen had not been against power companies. He wrote the blog post in response to a CIA statement, reported by security training body the Sans Institute, that a cyberattack had caused a power blackout in multiple cities in a country outside the US. The CIA also said it had evidence of blackmail demands following demonstrations of successful "intrusions through the Internet".

"Cyber-extortion is certainly on the rise; we see it at Counterpane," Schneier wrote. "Primarily it's against fringe industries -- online gambling, online gaming, online porn -- operating offshore in countries like Bermuda and the Cayman Islands. [Cyber-extortion] is going mainstream, but this is the first I've heard of it targeting power companies."

Schneier counselled calm, saying that it was not known whether supervisory control and data acquisition [Scada] arrays, which many critical national infrastructure organisations use to control and measure systems, had been compromised.

"This CIA titbit tells us nothing about how the attacks happened," Schneier wrote. "Were they against Scada systems? Were they against general-purpose [computers] -- maybe Windows machines? Insiders may have been involved, so was this a computer security vulnerability at all? We have no idea. I'd like a little bit more information before I start panicking."

Alan Paller, director of research for the Sans Institute, told ZDNet Australia sister site ZDNet.co.uk earlier this week that Tom Donahue -- the CIA analyst who reported the attack to a Sans Institute conference a week ago -- had not divulged the countries involved, nor the method of attack, nor when the attacks had occurred. However, Paller confirmed that US power companies had not been involved.

"All we know from Tom [Donahue] is that it was not US companies [that were attacked]," Paller wrote in an e-mail exchange with ZDNet.co.uk. "The CIA is involved because Tom [Donahue] is the person responsible for the US cyberthreat analysis, and he and his management chain must have felt the risk to US companies was elevated because it had happened for real in other countries, and because the quality of security in many US utilities needs immediate and substantial improvement."

Topic: Security

Tom Espiner

About Tom Espiner

Tom is a technology reporter for ZDNet.com. He covers the security beat, writing about everything from hacking and cybercrime to threats and mitigation. He also focuses on open source and emerging technologies, all the while trying to cut through greenwash.

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

0 comments
Log in or register to start the discussion