Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

10/5/2018
06:25 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Mandia: Tipping Point Now Here for Rules of Cyber Engagement

FireEye CEO and nation-state hacking expert Kevin Mandia says Russia began changing the game in 2015.

Kevin Mandia believes cybersecurity has reached a critical juncture globally.

"My gut is everyone is escalating in cyber. It feels different now," said the CEO of FireEye in an interview this week about current nation-state hacking activity. "We're going to have to do something, have some kind of international dialogue."  

Mandia has watched nation-state hacking and online activity evolve since the 1990s when serving as a cybercrime investigator with the US Air Force. It has shifted, he said, from a purely espionage operation – often with the spirit of mutual respect on both sides of the wire – to a more destructive and increasingly dangerous game crossing once-respected spy rule lines. Case in point: Russia's aggressive efforts to influence the US presidential election, including strategically leaking stolen information from the Democratic side, was the culmination of a shift that first appeared in 2015, he said.

"There is no solution to cybersecurity," he said. "We're at this juncture. ... Especially when there are very good hackers in Russia, North Korea, China, and Iran. So it's going to take technology and people. Now we have added diplomacy: We've got to have the conversation."

That means either the United Nations or NATO taking the lead and drawing the "red lines" of cyber engagement. "People say it's too hard to define a red line; what is too far? But is it?" Shutting down a utility would be an obvious line crossed, he said. "This isn't hard," Mandiant said. "You just start somewhere."

Former US Secretary of State Madeleine Albright, who delivered the keynote at the FireEye Cyber Defense Summit in Washington, DC, this week, also expressed her support of established norms for the Internet to quell malicious use and abuse. "It will take cooperation, and we [the US] as the innovators are the ones who need to take the lead on this," she said during an on-stage interview with Mandia.

"I happen to believe that the Russians are interfering in our elections and trying to separate us from our allies by using information technology. And the Chinese are getting better and better at it," Albright said. "This is why we need to have rules of the game."

All it would take is setting "intolerable events" – hacking lines that can't be crossed and consequences for a nation that does so, according to Mandia. It's getting frighteningly close to a time when "if you see a video, you cannot believe what you saw, end of story," he said. "And you do not want nations taking action on 'fake news' [such as that]. I think we're coming close to a tit for tat" environment online among nation-states.

Nations have to "sit down and talk" about cyber norms, he added.

The Global Commission on the Stability of Cyberspace (GCSC) at The Hague, meanwhile, in September outlined five new norms of responsible behavior on the Net, with the goal of governments, companies, and other organizations adopting them as policy and law. Among the proposed norms are ones that call for curbing botnet creation and offensive cyber operations by nation-states. 

"They've got the right idea," Mandia said.

Teamwork
Meanwhile, Britain, The Netherlands, and the US last week all called out Russian GRU military officers and hackers for alleged criminal activities. The US Department of Justice indicted seven Russian military intelligence officers for allegedly hacking and disparaging international anti-doping organizations and officials with online leaks.

While Britain called out Russia for major cyberattacks, the Dutch government expelled four of the indicted Russians after catching them from their rental car hacking into the Wi-Fi network of the organization investigating a chemical used in the recent attack on a former Russian spy in Britain.

"A multinational calling-out of another country" – in this case, Russia – is key, Mandia said. "Multinational pressure is far better than one country doing it."

So far, Iran and China appear to be following specific rules of cyber engagement when hacking US interests. "Iran [does] have their rules of engagement, which are different in different geographies. They are abiding by those rules when they attack the US now," he said.

Mandia said he has seen China mostly remain true to the 2015 pact between former President Barack Obama and Chinese president Xi Jinping, which promised that neither nation would engage in cyber espionage for economic gain. 

North Korea, however, remains an enigma when it comes to its cyber operations. "I can't see a pattern there. I don't know what's next; I couldn't guess what's next," he said.

Related Content:

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "SpearPhish! Everyone out of the office!"
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-1919
PUBLISHED: 2019-07-17
A vulnerability in the Cisco FindIT Network Management Software virtual machine (VM) images could allow an unauthenticated, local attacker who has access to the VM console to log in to the device with a static account that has root privileges. The vulnerability is due to the presence of an account w...
CVE-2019-1920
PUBLISHED: 2019-07-17
A vulnerability in the 802.11r Fast Transition (FT) implementation for Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected interface. The vulnerability is due to a lack of complete error handling conditi...
CVE-2019-1923
PUBLISHED: 2019-07-17
A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to improper input validation in the device configuration interface. An attacker could exploit this vulnerability by access...
CVE-2019-1940
PUBLISHED: 2019-07-17
A vulnerability in the Web Services Management Agent (WSMA) feature of Cisco Industrial Network Director (IND) could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid X.509 certificate. The vulnerability is due to insufficient X.509 certifi...
CVE-2019-1941
PUBLISHED: 2019-07-17
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability exists because th...