Attacks/Breaches
12/6/2012
11:17 AM
50%
50%

Swiss Spooks Warn Of Counter-Terrorism Intelligence Breach

Swiss government suspects insider may have stolen counter-terrorism information that had been shared with Switzerland by foreign governments, including Britain and the United States.

Who Is Hacking U.S. Banks? 8 Facts
Who Is Hacking U.S. Banks? 8 Facts
(click image for larger view and for slideshow)
Authorities in Switzerland have warned U.S. intelligence officials that a senior IT technician working for a Swiss intelligence service may have compromised U.S. and British counter-terrorism operations.

In September, Swiss attorney general Michael Lauber and a senior prosecutor, Carolo Bulletti, held a press conference to disclose the alleged data theft, and said that they had a suspect in custody. "The intention was to sell the data to other countries," said Bulletti, but authorities didn't know whether that had happened.

Earlier this week, Reuters reported that unnamed European intelligence sources with knowledge of the investigation said that Swiss authorities still haven't ascertained whether the suspect sold the data. That led Swiss authorities to warn all intelligence agencies that share counter-terrorism information with Switzerland -- including the CIA and Britain's Secret Intelligence Service, or MI6 -- that the information may have been sold to foreign intelligence agencies or commercial buyers.

[ The downfall of CIA director David Patraeus has lawmakers focusing on email and online privacy protection. Read more at The Petraeus Affair: Surveillance State Stopper? ]

The suspect worked for the NDB, Switzerland's federal intelligence service, which is part of its defense ministry, for eight years. He reportedly had administrator-level rights to most of the spy agency's networks, including ones storing highly secret information, and became disgruntled after feeling that higher-level managers were ignoring his recommendations.

Reportedly, the quantity of breached data involves terabytes of secret information and was stolen when the suspect copied it onto a portable hard drive and walked out of government premises with the drive stored in a backpack. Swiss authorities arrested the suspect -- who under Swiss laws can't be named -- in May, and said they recovered numerous portable devices containing the surreptitiously copied intelligence data. Authorities were tipped off by Swiss bank UBS, which had traced an attempt to open a new, numbered bank account to the IT technician. The suspect has been released on bail while the related investigation continues.

According to the European intelligence sources, the employee began displaying some of the classic warning signs that precede insider attacks, such as manifesting a disgruntled attitude and regularly failing to show up for work. The signs, however, were apparently ignored.

The Swiss case is far from the first time that a disgruntled IT-savvy employee with access to sensitive information has been accused of stealing it. In 2009, for example, MI6 caught Daniel Houghton, one of its computer programmers, trying to sell cutting-edge email interception technology, as well as staff lists containing cell phone numbers and home addresses for MI6 and Britain's MI5 domestic intelligence service. Houghton had downloaded at least 7,000 files onto a secure digital memory card and offered it for sale to the Dutch intelligence service, or AIVD. Dutch officials tipped off MI6, who busted Houghton in a sting operation.

Arguably, that data breach could have been prevented if proper controls been in place to monitor for unusual network behavior, such as copying 7,000 files to a removable memory card. The same, of course, could be said for the NDB in Switzerland, or for that matter, the Department of Defense, which saw 251,000 sensitive diplomatic cables get leaked to WikiLeaks. The alleged perpetrator, Private First Class Bradley Manning, an intelligence analyst, allegedly copied the data onto rewritable CDs, which he stored in a Lady Gaga CD case. According to psychologists, Manning's superiors ignored obvious insider-attack warning signs indicated in his emotional and mental state.

Benchmarking normal activity and then monitoring for users who stray from that norm is an essential strategy for getting ahead of potential data and system breaches. But choosing the right tools is only part of the effort. Without sufficient training, efficient deployment and a good response plan, attackers could gain the upper hand. Download our Fundamentals Of User Activity Monitoring report. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PJS880
50%
50%
PJS880,
User Rank: Ninja
12/17/2012 | 4:00:17 PM
re: Swiss Spooks Warn Of Counter-Terrorism Intelligence Breach
That was a great article to read. Did HR take an responsibility for not noting the signs of a disgruntled employee, because if they had this operation could have never been jeopardized , at least not by that IT technician. The people mentioned in the article for past attacks all had access to sensitive data, and judging form how they caught this was obviously not there area of focus.

Paul Sprague
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6228
Published: 2014-12-28
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split ...

CVE-2014-6229
Published: 2014-12-28
The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string,...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.