Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

4/18/2012
02:49 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Former FBI Cybercrime Top Cop Joins Startup That Targets The Attacker

Shawn Henry now heading up services arm of CrowdStrike, the semi-stealth startup that plans to more aggressively profile, target, and, ultimately, help unmask sophisticated cyberattackers

The toughest part about fighting cybercrime is actually catching the people behind the botnet, financial fraud, or cyberespionage. Just ask the former executive assistant director of the FBI's Criminal, Cyber, Response, and Services Branch, Shawn Henry, who late last month retired from the bureau after 24 years and today announced that he has joined startup CrowdStrike to continue the fight from the private sector.

Henry, the newly named president of CrowdStrike's Services division, says the static strategy of building a bigger wall isn't working against today's cybercriminals. CrowdStrike, which thus far has kept much of its strategy in stealth mode, is focusing on the bad actors behind targeted attacks, whether they are nation/state-sponsored hackers or financially motivated organized cybercriminals.

"If you profile the adversary and know what he's targeting, that allows you as the owner of the data to make strategic decisions on what to put on the network and how to store it. If you have a better understanding of them, that provides you with more granularity in your network defense and protecting your intellectual property," Henry says.

The ultimate goal is removing those bad actors. "From a law enforcement perspective, we have taken a couple hundred of those people out of play. Each was involved actively in breaching networks, and they are not doing that anymore," Henry says. "It's a multipronged approach: There needs to be defense, but for so long that's all we've been doing. There hasn't been any offense."

So what is a legitimate and legal offense by the private sector? "It's not just sitting back on your heels and trying to deflect the punches," Henry says. "It might be the way you move, it might be the sharing of intelligence with federal agencies or other companies. There are some deceptive tactics you can utilize that create challenges for the adversary. It's a whole host of things."

Henry says CrowdStrike's strategy is to help identify the bad guys and make it more expensive for them to operate. The company obviously won't cross any U.S. legal boundaries in their efforts, he says, and has no plans to hack the attackers.

[Financially driven cybercriminals are also using advanced persistent threat (APT) methods for longer staying power in order to increase their spoils. See APT-Type Attack A Moving Target. ]

CrowdStrike was co-founded by former McAfee executives George Kurtz, now president and CEO of the startup, and Dmitri Alperovitch, now CTO of CrowdStrike. Kurtz and Alperovitch first announced the company in February at the RSA Conference, where they demonstrated how advanced persistent threat (APT) attackers could use mobile devices to commit cyberespionage.

Alperovitch said he and Kurtz had become frustrated with the industry's continued approach of focusing on malware instead of the attacker -- the human behind the malware. "That's like looking at a gun or bullet as opposed to the shooter," he said in an interview during RSA. "We have an adversary problem, not a malware problem. The tools and exploits all change."

Big Data And Better 'Intel'
CrowdStrike is building technology to automate the discovery of attributes, behaviors, and techniques of attackers using "big data."

Henry says when he got the call from Kurtz after his retirement from the FBI in late March, he hadn't been looking for a new gig yet. "I have been talking for years as an agent about the need for the private sector to move into that space and to help companies become more secure. [CrowdStrike] was intriguing to me," he says.

He says he thinks his expertise and insight from the law enforcement side can help. "What I'm aware of and have learned I'll be bringing to them, specifically [from] the past five years, and not breaching any classified information," he says.

Gathering more intelligence on an attack is the new mantra within the security industry, especially given the more fatalistic perspective growing among security experts, vendors such as CrowdStrike, and businesses that the bad guys are likely already inside. So you need to know more about what they're trying to do to minimize the damage.

"There is certainly a trend forming around understanding the threat, its methods and techniques, its preferences and limitations, and its vulnerabilities of choice that they like to exploit: They are also human after all," says Jacques Remi Francoeur, founder and executive director of the Union of Concerned Cybersecurity Leaders. "Then you dynamically align your security measures toward the anticipated or more likely points and methods of attack."

But catching the bad guys isn't as simple as it sounds, he says. "Who is the customer for that? That is law enforcement's responsibility. Also, even if you put one behind bars, there are 10 [more] to take their place," Francoeur says. "It seems like we are headed down the same path as the measures against the drug trade. Billions spent with virtually no impact [on] the trade. However, without a deterrence, the problem would become rapidly much larger."

CrowdStrike's Henry says he envisions the approach taken by CrowdStrike will help catch some actual botmasters, cybercriminals, and cyberespionage actors. "I think we have to push the envelope a bit, but absolutely stay within the borders of the law," he says. "There's more we're able to do, and we will work with our attorneys" to ensure it's handled properly, he says.

Henry will oversee CrowdStrike's initial offerings, which include incident response services, enterprise adversary and malware assessment, and response and recovery.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
azdvzxfawqrwq
50%
50%
azdvzxfawqrwq,
User Rank: Apprentice
5/2/2012 | 10:29:57 PM
re: Former FBI Cybercrime Top Cop Joins Startup That Targets The Attacker
Chasing politicians is the world's most futile game of whac-a-mole. The only viable solution is to get control of those in power. Until these basics are done the industry, police, and government will continue to make fools of the taxpayers.

It's a cycle that will continue forever so I'm not sure I see your point.
macker490
50%
50%
macker490,
User Rank: Ninja
4/19/2012 | 1:03:57 PM
re: Former FBI Cybercrime Top Cop Joins Startup That Targets The Attacker
Chasing hackers is the world's most futile game of whac-a-mole.- The only viable solution is to get control of software updates, harden O/S systems and take advantage of public key encryption to AUTHENTICATE transactions.- Until these basics are done the hackers will make fools of the industry, police, and government
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Microsoft Tools Focus on Insider Risk, Data Protection at Ignite 2019
Kelly Sheridan, Staff Editor, Dark Reading,  11/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Dueling Free Throws A riff on the song Dueling Banjos
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprise
Assessing Cybersecurity Risk in Today's Enterprise
Security leaders are struggling to understand their organizations risk exposure. While many are confident in their security strategies and processes, theyre also more concerned than ever about getting breached. Download this report today and get insights on how today's enterprises assess and perceive the risks they face in 2019!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18862
PUBLISHED: 2019-11-11
maidag in GNU Mailutils before 3.8 is installed setuid and allows local privilege escalation in the url mode.
CVE-2019-18853
PUBLISHED: 2019-11-11
ImageMagick before 7.0.9-0 allows remote attackers to cause a denial of service because XML_PARSE_HUGE is not properly restricted in coders/svg.c, related to SVG and libxml2.
CVE-2019-18854
PUBLISHED: 2019-11-11
A Denial Of Service vulnerability exists in the safe-svg (aka Safe SVG) plugin through 1.9.4 for WordPress, related to unlimited recursion for a '<use ... xlink:href="#identifier">' substring.
CVE-2019-18855
PUBLISHED: 2019-11-11
A Denial Of Service vulnerability exists in the safe-svg (aka Safe SVG) plugin through 1.9.4 for WordPress, related to potentially unwanted elements or attributes.
CVE-2019-18856
PUBLISHED: 2019-11-11
A Denial Of Service vulnerability exists in the SVG Sanitizer module through 8.x-1.0-alpha1 for Drupal because access to external resources with an SVG use element is mishandled.