Risky Business #764 -- Mossad expands into telecommunications services
Sep 18, 2024
auto_awesome
This week, the discussion highlights Hezbollah's failed attempt to escape Israeli surveillance using pagers, resulting in explosive consequences. The U.S. intensifies scrutiny of RT's role in disinformation campaigns, while Australia counters Chinese aggression in the Pacific. CISA reveals that valid accounts are the leading breach point. Insights into the precarious landscape of cybersecurity emerge, with vendors struggling to keep pace. Also, an interview sheds light on advanced phishing detection and the need for evolving security strategies in today's digital threat environment.
Israel's interception of Hezbollah shipments illustrates the complex risks of supply chain infiltration in military operations.
The U.S. Department of Justice is intensifying actions against RT, revealing its ties to Russian intelligence and disinformation efforts.
Australia's cybersecurity initiatives in the Pacific highlight its strategic response to Chinese influence and commitment to regional stability.
Deep dives
Supply Chain Infiltration Operation in Lebanon
A recent operation involving Israel highlights the risks associated with supply chain infiltration, particularly in military contexts. Israel reportedly intercepted shipments intended for Hezbollah, fitting them with explosives before delivery. This sophisticated tactic illustrates a significant level of planning and execution, as evidence suggests that strategically intercepting such shipments is complex and requires extensive knowledge of the supply chain. The use of pagers by Hezbollah, believed to provide better security against tracking, paradoxically led to a devastating attack due to Israel's technological capabilities.
US Government Actions Against Russian Disinformation
The US Department of Justice has intensifying its measures against Russian state-controlled media, particularly RT, which is now allegedly integrated with Russian intelligence operations. Recent developments include allegations that RT operates a cyber unit engaged in information warfare, although specifics on its activities remain unclear. In response to this revelation, platforms like Meta have banned RT-related content, illustrating a coordinated effort to weaken Russia's misinformation capabilities. This proactive approach marks a significant shift from previous responses to foreign disinformation campaigns, reflecting lessons learned from past election cycles.
Cybersecurity Response to China in Pacific Islands
Australia's recent cybersecurity support directed towards the Pacific Islands Forum reflects a strategic diplomatic move amid increasing Chinese influence in the region. Following reported cyber incidents attributed to China, Australia dispatched incident responders to assist Pacific nations, showcasing its commitment to regional security. This action not only aims to counteract Chinese cyber operations but also strengthens Australia’s relationships with its Pacific neighbors. The broader implication is that Australia is positioning itself as a reliable partner against Chinese aggression, promoting stability in a geopolitically volatile area.
Shift in Focus Towards Identity Security Products
The emergence of sophisticated phishing kits that bypass traditional security measures has led to an increased emphasis on identity security products. Organizations are beginning to recognize that phishing remains a vulnerable point with significant risks, prompting a shift away from reliance solely on multi-factor authentication. Identity security products that integrate with browsers to provide end-user protection against phishing attempts have gained traction. Notably, these products can effectively monitor user behavior in real time, allowing for a more proactive defense against emerging threats.
Using Terrorism Statutes Against Cyber Criminals
Recent efforts by the DOJ to employ terrorism statutes to prosecute cybercriminals demonstrate a novel approach amid rising cyber extortion cases. This strategy emerges from the growing severity of threats, particularly those involving violence and exploitation within cybercrime communities. While deploying such laws may encounter resistance in courts due to high burdens of proof, the increasing complexity of cyber threats justifies this approach. Ultimately, the goal is to adapt legal frameworks to better address the new realities of cybercrime, reflecting a commitment to combating such serious offenses.
On this week’s show, Patrick Gray and Adam Boileau discuss the weeks security news, including:
Hezbollah’s attempts to avoid SIGINT with pagers ends in explosions
The US shines many bright lights on RT’s disinfo role
Australia counters Chinese bullying in the Pacific
Valid accounts are the most prevalent entry point, says CISA’s data
Ivanti and Fortinet vie for worst vendor of the week
Krebs writes up the shift towards charging The Com with terrorism
And much, much more…
This week’s episode is sponsored by Push Security, who bring security visibility to where it needs to be these days – the browser. Luke Jennings joins this week’s show to discuss how phish-kit crews are driving the arms race forward, and how detection has to adapt and go where the users are.