Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

4/18/2012
02:49 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Former FBI Cybercrime Top Cop Joins Startup That Targets The Attacker

Shawn Henry now heading up services arm of CrowdStrike, the semi-stealth startup that plans to more aggressively profile, target, and, ultimately, help unmask sophisticated cyberattackers

The toughest part about fighting cybercrime is actually catching the people behind the botnet, financial fraud, or cyberespionage. Just ask the former executive assistant director of the FBI's Criminal, Cyber, Response, and Services Branch, Shawn Henry, who late last month retired from the bureau after 24 years and today announced that he has joined startup CrowdStrike to continue the fight from the private sector.

Henry, the newly named president of CrowdStrike's Services division, says the static strategy of building a bigger wall isn't working against today's cybercriminals. CrowdStrike, which thus far has kept much of its strategy in stealth mode, is focusing on the bad actors behind targeted attacks, whether they are nation/state-sponsored hackers or financially motivated organized cybercriminals.

"If you profile the adversary and know what he's targeting, that allows you as the owner of the data to make strategic decisions on what to put on the network and how to store it. If you have a better understanding of them, that provides you with more granularity in your network defense and protecting your intellectual property," Henry says.

The ultimate goal is removing those bad actors. "From a law enforcement perspective, we have taken a couple hundred of those people out of play. Each was involved actively in breaching networks, and they are not doing that anymore," Henry says. "It's a multipronged approach: There needs to be defense, but for so long that's all we've been doing. There hasn't been any offense."

So what is a legitimate and legal offense by the private sector? "It's not just sitting back on your heels and trying to deflect the punches," Henry says. "It might be the way you move, it might be the sharing of intelligence with federal agencies or other companies. There are some deceptive tactics you can utilize that create challenges for the adversary. It's a whole host of things."

Henry says CrowdStrike's strategy is to help identify the bad guys and make it more expensive for them to operate. The company obviously won't cross any U.S. legal boundaries in their efforts, he says, and has no plans to hack the attackers.

[Financially driven cybercriminals are also using advanced persistent threat (APT) methods for longer staying power in order to increase their spoils. See APT-Type Attack A Moving Target. ]

CrowdStrike was co-founded by former McAfee executives George Kurtz, now president and CEO of the startup, and Dmitri Alperovitch, now CTO of CrowdStrike. Kurtz and Alperovitch first announced the company in February at the RSA Conference, where they demonstrated how advanced persistent threat (APT) attackers could use mobile devices to commit cyberespionage.

Alperovitch said he and Kurtz had become frustrated with the industry's continued approach of focusing on malware instead of the attacker -- the human behind the malware. "That's like looking at a gun or bullet as opposed to the shooter," he said in an interview during RSA. "We have an adversary problem, not a malware problem. The tools and exploits all change."

Big Data And Better 'Intel'
CrowdStrike is building technology to automate the discovery of attributes, behaviors, and techniques of attackers using "big data."

Henry says when he got the call from Kurtz after his retirement from the FBI in late March, he hadn't been looking for a new gig yet. "I have been talking for years as an agent about the need for the private sector to move into that space and to help companies become more secure. [CrowdStrike] was intriguing to me," he says.

He says he thinks his expertise and insight from the law enforcement side can help. "What I'm aware of and have learned I'll be bringing to them, specifically [from] the past five years, and not breaching any classified information," he says.

Gathering more intelligence on an attack is the new mantra within the security industry, especially given the more fatalistic perspective growing among security experts, vendors such as CrowdStrike, and businesses that the bad guys are likely already inside. So you need to know more about what they're trying to do to minimize the damage.

"There is certainly a trend forming around understanding the threat, its methods and techniques, its preferences and limitations, and its vulnerabilities of choice that they like to exploit: They are also human after all," says Jacques Remi Francoeur, founder and executive director of the Union of Concerned Cybersecurity Leaders. "Then you dynamically align your security measures toward the anticipated or more likely points and methods of attack."

But catching the bad guys isn't as simple as it sounds, he says. "Who is the customer for that? That is law enforcement's responsibility. Also, even if you put one behind bars, there are 10 [more] to take their place," Francoeur says. "It seems like we are headed down the same path as the measures against the drug trade. Billions spent with virtually no impact [on] the trade. However, without a deterrence, the problem would become rapidly much larger."

CrowdStrike's Henry says he envisions the approach taken by CrowdStrike will help catch some actual botmasters, cybercriminals, and cyberespionage actors. "I think we have to push the envelope a bit, but absolutely stay within the borders of the law," he says. "There's more we're able to do, and we will work with our attorneys" to ensure it's handled properly, he says.

Henry will oversee CrowdStrike's initial offerings, which include incident response services, enterprise adversary and malware assessment, and response and recovery.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
azdvzxfawqrwq
50%
50%
azdvzxfawqrwq,
User Rank: Apprentice
5/2/2012 | 10:29:57 PM
re: Former FBI Cybercrime Top Cop Joins Startup That Targets The Attacker
Chasing politicians is the world's most futile game of whac-a-mole. The only viable solution is to get control of those in power. Until these basics are done the industry, police, and government will continue to make fools of the taxpayers.

It's a cycle that will continue forever so I'm not sure I see your point.
macker490
50%
50%
macker490,
User Rank: Ninja
4/19/2012 | 1:03:57 PM
re: Former FBI Cybercrime Top Cop Joins Startup That Targets The Attacker
Chasing hackers is the world's most futile game of whac-a-mole.- The only viable solution is to get control of software updates, harden O/S systems and take advantage of public key encryption to AUTHENTICATE transactions.- Until these basics are done the hackers will make fools of the industry, police, and government
For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17537
PUBLISHED: 2019-10-13
Jiangnan Online Judge (aka jnoj) 0.8.0 has Directory Traversal for file deletion via the web/polygon/problem/deletefile?id=1&name=../ substring.
CVE-2019-17538
PUBLISHED: 2019-10-13
Jiangnan Online Judge (aka jnoj) 0.8.0 has Directory Traversal for file reading via the web/polygon/problem/viewfile?id=1&name=../ substring.
CVE-2019-17535
PUBLISHED: 2019-10-13
Gila CMS through 1.11.4 allows blog-list.php XSS, in both the gila-blog and gila-mag themes, via the search parameter, a related issue to CVE-2019-9647.
CVE-2019-17536
PUBLISHED: 2019-10-13
Gila CMS through 1.11.4 allows Unrestricted Upload of a File with a Dangerous Type via the moveAction function in core/controllers/fm.php. The attacker needs to use admin/media_upload and fm/move.
CVE-2019-17533
PUBLISHED: 2019-10-13
Mat_VarReadNextInfo4 in mat4.c in MATIO 1.5.17 omits a certain '\0' character, leading to a heap-based buffer over-read in strdup_vprintf when uninitialized memory is accessed.