Last week, The Independent and i joined the list of organisations to be targeted by the Syrian Electronic Army or SEA. The email address of a former staff member was being used to approach other colleagues. The email contained a link: when they clicked on the link, it asked for a password; if they had complied, then our entire system would have been compromised.
Fortunately, we spotted it before any harm was done. What could have happened? Well, anything from our production operation and websites breaking down, to messages going out in our name in support of the Syrian President, Bashar al-Assad.
We were the latest media company to be on the receiving end of the SEA’s attacks. They include Facebook and Twitter – the accounts of President Obama and Nicolas Sarkozy were hacked – and Al Jazeera, BBC, Reuters and Associated Press. In the case of the BBC, its weather service sent out tweets that were explicitly anti-Israel and pro-Assad.
I confess, until then, I’d been fairly blasé about cyber-attacks. Sure, I’d received my fair share of Nigerian fraud emails and the like down the years. What was different about the SEA effort was the level of sophistication. The SEA is not to be taken lightly. In April this year, a false tweet from the Associated Press news agency claimed the White House had been bombed and President Obama was injured. It led to a $136.5bn collapse in the S&P 500 before order could be restored.
A leader of the SEA has claimed it is not officially aligned to the Assad regime. But it uses a domain name that must be approved by the Syrian government and a previous address was traceable to the Syrian Computer Society. The head of that society, until he took charge of the entire country, was one Bashar al-Assad. The President has lauded the SEA, calling it “a real army in a virtual reality”.
Assad’s software soldiers, official or not, are just one manifestation of a phenomenon that has been sweeping the globe. Very few of us are treating cyber-crime seriously enough. Everyone is at risk, and the infiltration can come at any time.
The Bank of England is aware of the problem – how can it not be – and has launched one large-scale exercise already to test the computer defences of the major banks. Called Operation Waking Shark, it consisted of a day-long simulated systems invasion, entailing sustained efforts to break into payments and accounts across the entire industry, and took place two years ago. Next month, Operation Waking Shark 2, involving the Bank, Financial Conduct Authority and Treasury, will see how the security barriers have improved.
I’m all for it but it also makes me nervous. First, the name smacks of a curiously British attitude – you imagine they must have spent hours choosing it and had great fun in the process. Then, an awful lot can change in two years – just look at the speed of technological advancement. We should be holding them every six months at least.
Likewise, when I see the official bodies running it, I shudder: I want to see the participation of real, tough, organised crime and anti-terror experts, who are used to moving quickly and decisively and are familiar with how the perpetrators think and behave. I wonder how many Whitehall memos must go back and forth agreeing on the outcome of the exercise and the new controls to be recommended, and how long the whole thing will take. The hackers, I can’t help thinking, are several steps ahead.
That’s not to knock the good intention, but are Operations Waking Shark 1 and 2 really enough? Shouldn’t we be receiving repeated warnings and advice as to what information we can safely put up online and what is dangerous? Banks have spent fortunes on their defences but this is meaningless if details that give someone access to employee or customer files can be easily obtained elsewhere.
We’ve got into a bad habit of sharing too much information about ourselves with the world at large, via Facebook, Twitter and LinkedIn. As we almost discovered to our cost, there are tonnes of material out there that could be useful to a hacker, in numerous directories that includes email addresses of ex-employees. If you receive an email that ontains some detail that is accurate or is from someone you know, you’re bound to be more likely to open it, aren’t you?
If I was the Government I would resolve that cyber-crime is the biggest threat our financial system faces and make all manner of manpower and equipment available to combat it. Have the police got their priorities right?
The IRA said after the Brighton bombing: “We only have to be lucky once – you have to be lucky always.” The same is true of the hackers.
Chris Blackhurst is Group Content DirectorReuse content