Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/3/2009
12:06 AM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Are Web Site Defacements Really Cyber War?

Almost every time there's a physical conflict, online "attacks" follow. And the recent spate of Palestinian Web site defacements are no exception. This sort of reaction on the Internet is certainly not new. In fact, we can only expect them to escalate.

Almost every time there's a physical conflict, online "attacks" follow. And the recent spate of Palestinian Web site defacements are no exception. This sort of reaction on the Internet is certainly not new. In fact, we can only expect them to escalate.In 2000, we covered increased online tensions that followed a flare-up in the Israeli-Palestinian conflict at that time. Then, it appeared that attackers were targeting AT&T. Then, in 2001, a flurry of attacks occurred in early May and then again in August following the death of Chinese pilot Wang Wei when his fighter jet collided with a U.S. spy plane.

Earlier this year, Estonia convicted a student for organizing the cyberattacks (specifically a distributed denial-of-service attack) that temporarily devastated that country's Internet access.

So it should come as no surprise that, a week into the ending of the Gaza cease-fire, there are reports that Israeli-operated Web sites have been defaced, as well as other reports regarding attackers from Iran getting involved in the cyberskirmish.

I wouldn't classify Web site defacements, or even ad hoc groups launching denial-of-service attacks, as cyberwar. These actions are more akin to protest demonstrations or "hacktivism."

Unfortunately, in the future we can expect these types of incidents to evolve from hacktivism to state-sponsored cyberwar events.

And these events will escalate, not only in the quantity of attacks, but in the tactical quality of them as well. For instance, more of the systems used to manage critical infrastructure, such as SCADA systems, are now connected to the Internet for remote monitoring and management capabilities. This obviously makes them easier targets for attack. While most every one of these systems used to be completely air-gapped from the Internet, this, my reporting is telling me, is no longer always the case. More plants are relying on logical separation of these critical infrastructure networks from the public Internet. When it comes to critical infrastructure management, I don't think we should rely on firewall or vLAN segmentation.

Then there's the risk from old-fashioned physical attacks to the underlying digital infrastructure: cut communication lines, a downed power grid, denial-of-service attacks levied against the financial network, and so on.

What's concerning is that these critical infrastructures are where many adversarial organizations are increasingly placing their attention. Earlier this year I wrote about how Western intelligence agencies are growing concerned about Hezbollah's hacking capabilities. Agencies estimate that the organization has moderate capabilities to exploit software vulnerabilities, as well as key infrastructure systems that include utilities, banking, media/TV systems, telecommunications, and air traffic control systems.

That should be a sobering notion for any Westerner, as the United States and other Western countries are the most technologically dependent nations, and the costs to wage cyberwar are incredibly low.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27621
PUBLISHED: 2020-10-22
The FileImporter extension in MediaWiki through 1.35.0 was not properly attributing various user actions to a specific user's IP address. Instead, for various actions, it would report the IP address of an internal Wikimedia Foundation server by omitting X-Forwarded-For data. This resulted in an inab...
CVE-2020-27620
PUBLISHED: 2020-10-22
The Cosmos Skin for MediaWiki through 1.35.0 has stored XSS because MediaWiki messages were not being properly escaped. This is related to wfMessage and Html::rawElement, as demonstrated by CosmosSocialProfile::getUserGroups.
CVE-2020-27619
PUBLISHED: 2020-10-22
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
CVE-2020-17454
PUBLISHED: 2020-10-21
WSO2 API Manager 3.1.0 and earlier has reflected XSS on the "publisher" component's admin interface. More precisely, it is possible to inject an XSS payload into the owner POST parameter, which does not filter user inputs. By putting an XSS payload in place of a valid Owner Name, a modal b...
CVE-2020-24421
PUBLISHED: 2020-10-21
Adobe InDesign version 15.1.2 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .indd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.