Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/15/2012
04:40 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Ex-eBay CISO's Startup Aims To Beef Up Attack Information-Sharing

SecurityStarfish offers commercial service for victim companies to anonymously share breach war stories, intelligence, mitigations

The former chief information security officer at eBay has launched a new startup that offers a subscription-based service for companies hit by cyberattacks to anonymously share their war stories and obtain inside information on new attack campaigns and deflection methods.

SecurityStarfish, co-founded by David Cullinane, who served as CISO at eBay for five years, and Gordon Shevlin, former executive vice president at FishNet, emerged from stealth this week offering a commercial platform that analyzes its members' shared attack intelligence, remedies for defense, and offers heads-up attack information.

Talk of victims teaming to fight back against cyberattackers rather than going it alone began in earnest in the wake of the game-changing targeted hacks of Google, Intel, Adobe, and others in early 2010. While numerous ad-hoc and industry-specific mechanisms and groups exist for companies to swap their attack stories and intelligence, the majority of these efforts by nature are voluntary and informal. SecurityStarfish is taking that strategy to a more commercial level -- something that Cullinane, who spent years working with other companies to share their attack experiences and intelligence informally, says is key to successfully converting that information into action that helps protect those organizations from falling victim to other attacks.

[ Major global corporations call for more collaboration among organizations hit by cyberattacks, but the devil's in the details. See Victim Businesses Teaming Up To Fight Cybercriminals. ]

SecurityStarfish CEO Cullinane says during his tenure at eBay, he worked with other CSOs to share attack information on an ad-hoc basis, but in many cases, the process hit a dead end. "By the time we explained to each other what had happened, and PR, and legal" got involved, things didn't go much further, he says. "One of the problems with this is it's based on volunteer [activity]. People get busy with things, priorities shift, and [follow-up] doesn't always work."

So he spoke with some CSOs at the RSA Conference earlier this year and cemented the idea of making this attack info-sharing process a paid enterprise so it becomes a more official and regular process -- with follow-up. "We are trying to change the picture from the adversary making money ... to changing the balance of power, so to speak, by getting things done more effectively in collaboration and stop them from being able to monetize" their attacks, Cullinane says.

SecurityStarfish provides a portal to its members, which currently span Fortune companies in the financial services, manufacturing, retail, and energy industries, where they anonymously submit information and intelligence about attacks they've experienced. The company then analyzes all of the data using various tools, including Hadoop, and provides frequent reports that analyze the latest threats and provide guidance on how to remediate and protect against them.

"We give them feedback on what's happening in their vertical and cross-vertically," Cullinane says. "It's not just intelligence-gathering, aggregation, and doing the sophisticated analysis of what's happening out there." SecurityStarfish also will host working forums several times a year where member companies can share what they are doing that works in preventing attacks or mitigating threats, he says, as well as collaborate on mitigation and defense strategies.

So what does this new commercial entity mean for the ad-hoc, regional, and industry-specific attack information-sharing groups out there, including the ISACs, InfraGuards, and others?

These groups will remain key go-to places for many companies and organizations, experts say. But it's unclear in the future how organizations will select which one to go to in the aftermath of an attack if they join up with a commercial enterprise like SecurityStarfish.

"The predominant way of sharing war stories and information is to get a bunch of peers together, close the doors, and talk about it," says Wade Baker, director of risk intelligence at Verizon. "I think it's useful and serves its purposes. But when you're talking at sharing tactical-level information, you can't have a session to share that information fast enough."

Baker concurs that one of the big hurdles with ad-hoc efforts is the corporate legal department. "I think there's more recognition of the value this kind of information has, so therefore there's a greater willingness at least to look at methods of sharing this kind of intelligence responsibly," he says.

If a company shares a malware hash it found on one of itssystems that its antivirus didn't catch, that could help the rest of the community, he says. "If legal can understand what they're doing there ... and that next time [AV] will be able recognize it as badware because other organizations" shared their samples, then it could smooth the way for more sharing, he says.

Jacques Francoeur, founder and executive director of the Union of Concerned Cybersecurity Leaders (UCCL) and a former officer with the Bay Area CSO Council, says the key difference with SecurityStarfish's approach is that it formalizes a breach-information exchange. And that's a two-edged sword: "When you formalize it, you have to put in place disclosure agreements, and the formalization process, in many cases, is a path to killing the exchange [of information]. Legal does not yet appreciate the upside of sharing," he says.

Meanwhile, the informal, ad-hoc method in use today is not scalable, he says.

SecurityStarfish costs $60,000 per year, and Cullinane says his company's collaboration model is ultimately cheaper than going it alone. "The cost of doing this as an individual company that has to figure out a solution to every single attack or type of attack becomes an incredibly expensive proposition," he says. Teaming in the fight is the only way to beat the bad guys, who already collaborate among themselves, he says.

UCCL's Francoeur says the value of SecurityStarfish would come from the "actionable information" it offers its members. The catch, he says, will be what level and quality of intelligence the members provide. "And they'll have to get a critical mass so there's sufficient value to other members," he says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
Preventing PTSD and Burnout for Cybersecurity Professionals
Craig Hinkley, CEO, WhiteHat Security,  9/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14821
PUBLISHED: 2019-09-19
An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->l...
CVE-2019-15032
PUBLISHED: 2019-09-19
Pydio 6.0.8 mishandles error reporting when a directory allows unauthenticated uploads, and the remote-upload option is used with the http://localhost:22 URL. The attacker can obtain sensitive information such as the name of the user who created that directory and other internal server information.
CVE-2019-15033
PUBLISHED: 2019-09-19
Pydio 6.0.8 allows Authenticated SSRF during a Remote Link Feature download. An attacker can specify an intranet address in the file parameter to index.php, when sending a file to a remote server, as demonstrated by the file=http%3A%2F%2F192.168.1.2 substring.
CVE-2019-16412
PUBLISHED: 2019-09-19
In goform/setSysTools on Tenda N301 wireless routers, attackers can trigger a device crash via a zero wanMTU value. (Prohibition of this zero value is only enforced within the GUI.)
CVE-2019-16510
PUBLISHED: 2019-09-19
libIEC61850 through 1.3.3 has a use-after-free in MmsServer_waitReady in mms/iso_mms/server/mms_server.c, as demonstrated by server_example_goose.