Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

2/13/2018
10:30 AM
Joseph Carson
Joseph Carson
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Fake News: Could the Next Major Cyberattack Cause a Cyberwar?

In the way it undercuts trust, fake news is a form of cyberattack. Governments must work to stop it.

Fake news — we've all heard about it, but sometimes we struggle to grasp the extent of its impact.

With more people moving online and social media becoming the go-to news source, and with a good chunk of what is put on social media being fake, the reader must determine whether information is true or not. When people believe everything they read, the world becomes an unpredictable place.

In the past, we could easily choose which news source to follow and have a high level of confidence about its accuracy. Today, however, with news arriving to us in a social media feed, both trusted and fake news sources are merged together — and the consumer must decide whether or not to believe the news. With no clear indication of the truth or the source of news on social media, many countries, democracies, and nation-states will struggle with transparency and could become politically instable. It only takes one fake news story within a trustworthy source to devalue an entire news feed, forcing us to question what is real and what is not.

To put it bluntly, fake news is a form of cyberattack and will only grow significantly in 2018 and beyond.

Attribution, Transparency & Response
Fake information has become a major disruption to our way of life, filling our news feeds to influence our actions in an attempt to change the outcome of important decisions, including elections. Rather than focusing on the important needs of citizens — such as taxes, health, and education — many governments are now embroiled in trust and transparency challenges caused by the continuous disruption from cyberattacks. We have seen the governments in both the US and UK increasing focus and attention on recent cyber incidents with little to no transparency.   

Many recent cyber incidents have involved the theft of huge amounts of personal and sensitive information that is then used to pursue and influence our nation's decision-making. Some notable cyber incidents — for example, breaches at Yahoo, Ashley Madison, and Equifax —exposed sensitive data that could be used via news feeds to trigger emotions and reactions. When a cyberattack from another nation-state tries to influence our way of life, our society, or our government, should this be considered an act of war?

Large troll factories and botnet farms are using our stolen personal information to guarantee that our news feeds are filled with fake information that attracts readers to respond and participate, creating a growing trend that encircles friends and family. This could start from a machine-controlled bot that wants you to share malicious information, influence your friends' decisions, and distrust your own government, creating divisions rather than giving you true information.   

National Ownership & International Cooperation
It's clear that cyberattacks are crossing country borders and disrupting our way of life, without nation-states taking responsibility. We hear about cybercriminal groups that are behind many of the major cyber incidents in recent years, including data breaches, ransomware, or the targeting of government agencies' classified information. Companies and governments have linked these cybercriminal groups to nation-states; for example, both FireEye and Symantec have accused North Korea of being behind the WannaCry ransomware, though they haven't revealed concrete evidence and North Korea has denied involvement. Without clear cooperation and transparency, this problem will grow with into increasing numbers of cyberattacks on critical infrastructure, political affiliations, financial institutions, and communications.

To prevent a major catastrophe from occurring, governments and nation-states need to work together on cyber attribution with full cooperation and transparency that holds each other responsible for the actions of criminal organizations operating from within their borders. At the recent World Economic Forum, it was announced that a new Global Centre for Cybersecurity will be launched. This should focus on establishing cooperation between governments so that attribution is possible in the future; if a cybercrime has been committed, the governments involved should work together, similar to the way Interpol works today. It is equally important that governments do not provide a safe haven for cybercriminals to carry out such attacks, especially when they are doing it for financial and political gains  with and extreme aggression.

It is time for governments to act and protect democracy and our way of life. 

Related Content:

 

Black Hat Asia returns to Singapore with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall. Click for information on the conference and to register.

Joseph Carson has more than 25 years' experience in enterprise security, is the author of Privileged Account Management for Dummies and Cybersecurity for Dummies, and is a cybersecurity professional and ethical hacker. Joseph is a cybersecurity adviser to several governments, ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Average Cost of a Data Breach: $3.86 Million
Jai Vijayan, Contributing Writer,  7/29/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13151
PUBLISHED: 2020-08-05
Aerospike Community Edition 4.9.0.5 allows for unauthenticated submission and execution of user-defined functions (UDFs), written in Lua, as part of a database query. It attempts to restrict code execution by disabling os.execute() calls, but this is insufficient. Anyone with network access can use ...
CVE-2017-18112
PUBLISHED: 2020-08-05
Affected versions of Atlassian Fisheye allow remote attackers to view the HTTP password of a repository via an Information Disclosure vulnerability in the logging feature. The affected versions are before version 4.8.3.
CVE-2020-15109
PUBLISHED: 2020-08-04
In solidus before versions 2.8.6, 2.9.6, and 2.10.2, there is an bility to change order address without triggering address validations. This vulnerability allows a malicious customer to craft request data with parameters that allow changing the address of the current order without changing the shipm...
CVE-2020-16847
PUBLISHED: 2020-08-04
Extreme Analytics in Extreme Management Center before 8.5.0.169 allows unauthenticated reflected XSS via a parameter in a GET request, aka CFD-4887.
CVE-2020-15135
PUBLISHED: 2020-08-04
save-server (npm package) before version 1.05 is affected by a CSRF vulnerability, as there is no CSRF mitigation (Tokens etc.). The fix introduced in version version 1.05 unintentionally breaks uploading so version v1.0.7 is the fixed version. This is patched by implementing Double submit. The CSRF...