Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

10/5/2018
06:25 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Mandia: Tipping Point Now Here for Rules of Cyber Engagement

FireEye CEO and nation-state hacking expert Kevin Mandia says Russia began changing the game in 2015.

Kevin Mandia believes cybersecurity has reached a critical juncture globally.

"My gut is everyone is escalating in cyber. It feels different now," said the CEO of FireEye in an interview this week about current nation-state hacking activity. "We're going to have to do something, have some kind of international dialogue."  

Mandia has watched nation-state hacking and online activity evolve since the 1990s when serving as a cybercrime investigator with the US Air Force. It has shifted, he said, from a purely espionage operation – often with the spirit of mutual respect on both sides of the wire – to a more destructive and increasingly dangerous game crossing once-respected spy rule lines. Case in point: Russia's aggressive efforts to influence the US presidential election, including strategically leaking stolen information from the Democratic side, was the culmination of a shift that first appeared in 2015, he said.

"There is no solution to cybersecurity," he said. "We're at this juncture. ... Especially when there are very good hackers in Russia, North Korea, China, and Iran. So it's going to take technology and people. Now we have added diplomacy: We've got to have the conversation."

That means either the United Nations or NATO taking the lead and drawing the "red lines" of cyber engagement. "People say it's too hard to define a red line; what is too far? But is it?" Shutting down a utility would be an obvious line crossed, he said. "This isn't hard," Mandiant said. "You just start somewhere."

Former US Secretary of State Madeleine Albright, who delivered the keynote at the FireEye Cyber Defense Summit in Washington, DC, this week, also expressed her support of established norms for the Internet to quell malicious use and abuse. "It will take cooperation, and we [the US] as the innovators are the ones who need to take the lead on this," she said during an on-stage interview with Mandia.

"I happen to believe that the Russians are interfering in our elections and trying to separate us from our allies by using information technology. And the Chinese are getting better and better at it," Albright said. "This is why we need to have rules of the game."

All it would take is setting "intolerable events" – hacking lines that can't be crossed and consequences for a nation that does so, according to Mandia. It's getting frighteningly close to a time when "if you see a video, you cannot believe what you saw, end of story," he said. "And you do not want nations taking action on 'fake news' [such as that]. I think we're coming close to a tit for tat" environment online among nation-states.

Nations have to "sit down and talk" about cyber norms, he added.

The Global Commission on the Stability of Cyberspace (GCSC) at The Hague, meanwhile, in September outlined five new norms of responsible behavior on the Net, with the goal of governments, companies, and other organizations adopting them as policy and law. Among the proposed norms are ones that call for curbing botnet creation and offensive cyber operations by nation-states. 

"They've got the right idea," Mandia said.

Teamwork
Meanwhile, Britain, The Netherlands, and the US last week all called out Russian GRU military officers and hackers for alleged criminal activities. The US Department of Justice indicted seven Russian military intelligence officers for allegedly hacking and disparaging international anti-doping organizations and officials with online leaks.

While Britain called out Russia for major cyberattacks, the Dutch government expelled four of the indicted Russians after catching them from their rental car hacking into the Wi-Fi network of the organization investigating a chemical used in the recent attack on a former Russian spy in Britain.

"A multinational calling-out of another country" – in this case, Russia – is key, Mandia said. "Multinational pressure is far better than one country doing it."

So far, Iran and China appear to be following specific rules of cyber engagement when hacking US interests. "Iran [does] have their rules of engagement, which are different in different geographies. They are abiding by those rules when they attack the US now," he said.

Mandia said he has seen China mostly remain true to the 2015 pact between former President Barack Obama and Chinese president Xi Jinping, which promised that neither nation would engage in cyber espionage for economic gain. 

North Korea, however, remains an enigma when it comes to its cyber operations. "I can't see a pattern there. I don't know what's next; I couldn't guess what's next," he said.

Related Content:

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Lessons from the NSA: Know Your Assets
Robert Lemos, Contributing Writer,  12/12/2019
4 Tips to Run Fast in the Face of Digital Transformation
Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19807
PUBLISHED: 2019-12-15
In the Linux kernel before 5.3.11, sound/core/timer.c has a use-after-free caused by erroneous code refactoring, aka CID-e7af6307a8a5. This is related to snd_timer_open and snd_timer_close_locked. The timeri variable was originally intended to be for a newly created timer instance, but was used for ...
CVE-2014-8650
PUBLISHED: 2019-12-15
python-requests-Kerberos through 0.5 does not handle mutual authentication
CVE-2014-3536
PUBLISHED: 2019-12-15
CFME (CloudForms Management Engine) 5: RHN account information is logged to top_output.log during registration
CVE-2014-3643
PUBLISHED: 2019-12-15
jersey: XXE via parameter entities not disabled by the jersey SAX parser
CVE-2014-3652
PUBLISHED: 2019-12-15
JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL.