Fwd: Who to Blame for the Attack on the Internet - The answer is You, me and everyone else is in between
Dear listers Cross-posting intentional In the last few days the blogosphere and social media in general has been abuzz with the DDoS attack that brought down popular sites like Amazon and a Twitter. Have you wondered what role YOU could have played in this attack? Well, it turns out we are all not so innocent..Read on..
From: "FORTUNE Data Sheet" <fortune@email.fortune.com> Date: 22 October 2016 at 10:18:07 PM EAT To: <ali@hussein.me.ke> Subject: Who to Blame for the Attack on the Internet Reply-To: "Fortune" <reply-fec915777065057a-20_HTML-56937916-7213333-13@email.fortune.com>
FOLLOW SUBSCRIBE ANON TIP OCTOBER 22, 2016 Our worst hacking fears came true on Friday as criminals deployed millions of everyday objects — internet-connected cameras, printers and so on — to launch an attack on a critical part of the Internet. The attack was a success, crippling the websites of major companies like Amazon, Netflix and Twitter for hours at a time.
We now have a handle on what happened: hackers used publicly available source code to assemble a bot-net army of internet-enabled devices, and then directed those devices to send massive waves of junk requests to a DNS provider. The attack meant the provider, New Hampshire based Dyn, could not carry out its job of acting as a switchboard for the internet, and consumers could no longer reach popular websites.
The compromised devices, which make up the bot-net army, are still out there and unpatched, which means other attacks are likely on the way. This makes it a good time to ask who’s to blame for this debacle. We can start, of course, by fingering the hackers themselves, who appear to have unleashed the attack with profit motives in mind.
But we can also assign much of the blame to the companies whose sloppy security standards made the attack possible:
Wondering which IoT device types are part of the Mirai botnet causing trouble today? @briankrebs has the list: https://t.co/bETefDMa4Y
— Eric Skinner (@EricSkinner) October 22, 2016
//platform.twitter.com/widgets.js
We need laws that allow civil and/or criminal penalties for companies that sell systems this insecure https://t.co/Gj4S5Hj0xV
— Christopher Mims (@mims) October 22, 2016
//platform.twitter.com/widgets.js
A list of alleged culprits, compiled by security researcher Brian Krebs, include familiar names like Panasonic, Samsung and Xerox printers. The names also include lesser known makers of routers and cameras, which reportedly made up the bulk of the bot-net army.
It’s a good bet these companies are scrambling to update their product lines in a way that requires users to change the passwords (widespread use of default passwords are the main reason the devices got hacked in the first place). But it’s not fair to lay the entire blame squarely on the companies. Part of the responsibility should also lie with lawmakers and regulators, who have failed to create a safety system to account for the Internet-of-Things era we are now living in.
Finally, it’s time for consumers to acknowledge they have a role in the attack too. By failing to secure the internet-connected devices, they are endangering not just themselves but the rest of the Internet as well. No one think it’s acceptable for consumers to be clueless when they operate products like automobiles or propane tanks — so why is it okay for them to be careless with routers and security cameras?
On another note, there’s other security news this week, including a couple cool fin-tech features by Robert, which can read about below. Thanks as always for reading. And, for heaven’s sake, lock down your devices.
Jeff Roberts
@jeffjohnroberts
jeff.roberts@fortune.com
Welcome to the Cyber Saturday edition of Data Sheet, Fortune’s daily tech newsletter. Fortune reporter Robert Hackett here. You may reach me via Twitter, Cryptocat, Jabber (see OTR fingerprint on my about.me), PGP encrypted email (see public key on my Keybase.io), Wickr, Signal, or however you (securely) prefer. Feedback welcome.
.
THREATS Meet Coinbase 2.0. In 2012, Coinbase was one of the early cool kids of the bitcoin scene. Four years later, the company is barely mentioning bitcoin as it carries out a full pivot into a digital brokerage service for a wide range of money. (Fortune)
Facial recognition stops a Facebook burglar: Social media companies announced they have broken ties with a controversial company that scans their streams to identify faces for police departments. But it turns out Facebook has itself used the company to stop an intruder in CEO Mark Zuckerberg's office. (The Verge)
Ripple rocks it. Meanwhile, another fin-tech darling is riding high. Ripple announced a successful trial with 12 big banks that could lower settlement costs for cross-border currency transactions by 60 percent. (Fortune)
How Russia doxxed the DNC: Everyone not named Donald Trump is by now acknowledging that the hack of Democratic party emails was carried out by Russia. But just what did this entail? An Esquire feature reveals how the work was a years-long, meticulously planned operation. (Esquire)
I forgive you, Yahoo. How do customers react when you suffer the largest cyber-security breach in history? Apparently, they shrug. Yahoo said user numbers are about the same since the breach. Alas, it looks like the company's merger-mate won't be so forgiving — Verizon is making noises about bailing. (Fortune)
Share today's Data Sheet with a friend: http://fortune.com/newsletter/datasheet/
Looking for previous Data Sheets? Click here.
.
ACCESS GRANTED Mmmm, blockchain. Robert has a fascinating look at how Wal-Mart and IBM are using fin-tech tools to track pork safety in China:
Walmart plans to use technology developed by the Hyperledger Project, an open source software project that builds blockchain tools and is based out of the Linux Foundation...
The blockchain in question, a private database co-developed by IBM, is designed to provide the retailer with a way to indelibly record a list of transactions indicating how meat has flowed through a commercial network, from producers to processors to distributors to grocers—and finally, to consumers. Read more on Fortune.com
.
FORTUNE RECON 97% of Java Apps Harbor a Known Security Hole by Robert Hackett
Microsoft Cloud Warrant Cases Move Closer to Supreme Court by Jeff John Roberts
This Badge Blocks Your Face in Social Media Photos by Maddie Farber
Half of US Adults' Faces Are Being Scanned by Law Enforcement by Jeff John Roberts
NSA Contractor Accused of Stealing Data Will Face Espionage Charges Fortune/Reuters
.
.
ONE MORE THING If you want to hack a high profile target, spear-phishing is still the best bet. But just how do you carry it out? In the case of General Colin Powell and DNC Chair John Podesta, it was a plain old "Gmail" message. Here's an up close look at what not to click. (Motherboard)
. EMAIL ROBERT HACKETT
SUBSCRIBE
SHARE: . This message has been sent to you because you are currently subscribed to Cyber Saturday UNSUBSCRIBE HERE
Please read our Privacy Policy, or copy and paste this link into your browser: HTTP://WWW.FORTUNE.COM/PRIVACY
For Further Communication, Please Contact: FORTUNE Customer Service 3000 University Center Drive Tampa, FL 33612-6408
ADVERTISING INFO | SUBSCRIBE TO FORTUNE
Ali Hussein Principal Hussein & Associates +254 0713 601113
Twitter: @AliHKassim Skype: abu-jomo LinkedIn: http://ke.linkedin.com/in/alihkassim
"Discovery consists in seeing what everyone else has seen and thinking what no one else has thought". ~ Albert Szent-Györgyi
Sent from my iPad
Begin forwarded message:
I agree, we must critically analyse the risk exposure we place ourselves in as we enthusiastically embrace IOT. It is a wake up call because for once we realise that our cameras, fridges and printers can be used as weapons of mass destruction. In as much as this whole thing sounds like a script from a dooms day sci-fi thriller we must accept that it is a new reality which must adequately prepare ourselves for.
From a regulatory point of view, we must lobby to ensure that all IOT devices have very strict security standards, just like those required of all other sensitive technological infrastructure.
Kind regards, Rosemary Koech-Kimwatu. On 23 Oct 2016 19:13, "Ali Hussein via kictanet" < kictanet@lists.kictanet.or.ke> wrote:
Dear listers
Cross-posting intentional
In the last few days the blogosphere and social media in general has been abuzz with the DDoS attack that brought down popular sites like Amazon and a Twitter.
Have you wondered what role YOU could have played in this attack? Well, it turns out we are all not so innocent..Read on..
*From:* "FORTUNE Data Sheet" <fortune@email.fortune.com> *Date:* 22 October 2016 at 10:18:07 PM EAT *To:* <ali@hussein.me.ke> *Subject:* *Who to Blame for the Attack on the Internet* *Reply-To:* "Fortune" <reply-fec915777065057a-20_HTML-56937916-7213333-13@ email.fortune.com>
[image: twitter share] <https://click.email.fortune.com/?qs=7d1cb97b08a54cd89a63bd3156595a18fb76a8e422aaad43de21b2717f74c0298abd3271ecf3af79> [image: facebook share] <https://click.email.fortune.com/?qs=7d1cb97b08a54cd86111430ea32dfe4cf2a46a8c835438ac1bf1b2c9a9ff0ee1f73f10bdca2a0859> FOLLOW <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8a6aadcbdb98150198f4606ea4883e7630eff2f1504cd37df275c9eb18d440934> subscribe <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8e3c7a0604f4495fd5d26a056bbd18bc05009bd4dacbf312f534ffecc1df15108> ANON TIP <https://click.email.fortune.com/?qs=7d1cb97b08a54cd81f6cc120ae2be6d360b40ecec34f97fb4f534a5aecd758432ccfd316044c79db> October 22, 2016
Our worst hacking fears came true on Friday as criminals deployed millions of everyday objects — internet-connected cameras, printers and so on — to launch an attack <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8ae24cd6e62c52fc5fcf166af66a4737d3963e61a8f3514ae52bb499304004b8d> on a critical part of the Internet. The attack was a success, crippling the websites of major companies like Amazon <https://click.email.fortune.com/?qs=7d1cb97b08a54cd85042ba44640a09611552bd50e91322658025d61cc7e69b3b6cbb61b6b6712b10>, Netflix <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8b6bfa06478bd79a6417b1e473eda9f9f601d9c3cb9146198d710069a46ed7a0d> and Twitter for hours at a time.
We now have a handle on what happened: hackers used publicly available source code to assemble a bot-net army of internet-enabled devices, and then directed those devices to send massive waves of junk requests to a DNS provider. The attack meant the provider, New Hampshire based Dyn, could not carry out its job of acting as a switchboard for the internet, and consumers could no longer reach popular websites.
The compromised devices, which make up the bot-net army, are still out there and unpatched, which means other attacks are likely on the way. This makes it a good time to ask who’s to blame for this debacle. We can start, of course, by fingering the hackers themselves, who appear to have unleashed the attack with profit motives <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8d92181cd55f6c6b3f035afeb7b2ad406aa420e6b00b9bd33c3f129b554b4b83c> in mind.
But we can also assign much of the blame to the companies whose sloppy security standards made the attack possible:
Wondering which IoT device types are part of the Mirai botnet causing trouble today? @briankrebs <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8b40a3a8949c758766798afbd944bd8bc0dedb5fadb33905f147a532b7f2824fb> has the list: https://t.co/bETefDMa4Y <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8510b05d14ce1ef716063e0b37a5f368825eb1dba403a7cabccb90fa152755daf>
— Eric Skinner (@EricSkinner) October 22, 2016 <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8be8a26a11a685b24cbc03242cb39b73d9862196fcd81d0c880aa9be0efd3d272>
//platform.twitter.com/widgets.js <https://click.email.fortune.com/?qs=7d1cb97b08a54cd866493dc7c47e363e222e27f0a9dae8dcfc668c5e7d81279b8f909398ecfa2793>
We need laws that allow civil and/or criminal penalties for companies that sell systems this insecure https://t.co/Gj4S5Hj0xV <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8e220a1a259bbec7f41da1aa079fc112b411d410da32a20ca1b84b5a98756e9fa>
— Christopher Mims (@mims) October 22, 2016 <https://click.email.fortune.com/?qs=7d1cb97b08a54cd82b5f0a9985d53b548e0f94dbafc8f4f5cb20a1b378d5f36d69fbb519da1778c3>
//platform.twitter.com/widgets.js <https://click.email.fortune.com/?qs=7d1cb97b08a54cd866493dc7c47e363e222e27f0a9dae8dcfc668c5e7d81279b8f909398ecfa2793>
A list of alleged culprits <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8c27958954642dc875648b88e49e7f2b6eba9dfe705c8e0e91122c2af4e59efb7>, compiled by security researcher Brian Krebs, include familiar names like Panasonic, Samsung and Xerox <https://click.email.fortune.com/?qs=7d1cb97b08a54cd89b9c2ea8fb6dfa9c953537cb2ba5793314c1fd9c9931596afda266b84b66574c> printers. The names also include lesser known makers of routers and cameras, which reportedly made up the bulk of the bot-net army.
It’s a good bet these companies are scrambling to update their product lines in a way that requires users to change the passwords (widespread use of default passwords are the main reason the devices got hacked in the first place). But it’s not fair to lay the entire blame squarely on the companies. Part of the responsibility should also lie with lawmakers and regulators, who have failed to create a safety system to account for the Internet-of-Things era <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8fa41254767352c180d4e2b79d111f07ae739deffc33eaa5e845a252e6a53ef80> we are now living in.
Finally, it’s time for consumers to acknowledge they have a role in the attack too. By failing to secure the internet-connected devices, they are endangering not just themselves but the rest of the Internet as well. No one think it’s acceptable for consumers to be clueless when they operate products like automobiles or propane tanks — so why is it okay for them to be careless with routers and security cameras?
On another note, there’s other security news this week, including a couple cool fin-tech features by Robert, which can read about below. Thanks as always for reading. And, for heaven’s sake, lock down your devices.
Jeff Roberts
@jeffjohnroberts
jeff.roberts@fortune.com
*Welcome to the Cyber Saturday edition of Data Sheet, *Fortune’*s* *daily tech newsletter. *Fortune* reporter Robert Hackett here. You may reach me via Twitter <https://click.email.fortune.com/?qs=7d1cb97b08a54cd816fc246a0753a1689ad4a092c67c98ddbdd5af6c16c66801f615285420b379a2>, Cryptocat <https://click.email.fortune.com/?qs=7d1cb97b08a54cd850b38c007e565f3a845bc7eadce31b6f919ecd2403d45cddfd8d86eb385e43c1>, Jabber <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8b5882fd27b213153972fd3b7eda143569a2d9b7fee2ed6fdf706e5f1cad1092d> (see OTR fingerprint on my about.me <https://click.email.fortune.com/?qs=7d1cb97b08a54cd889235418310da4cb397ae441f60644f24f65c9999c5dd0d5fdd53ba76dcc7f36>), PGP encrypted email (see public key on my Keybase.io <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8a107f886a95135a1ca5dddb8eb6e6508a69be3f5ef0f478acfe0024e5586bd97>), Wickr <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8a73c56e73f96e3640c0be90b9a0cfd39acccda0fd376e13dc0612da02fabd7f1>, Signal <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8611d65f6926f7e9d6538ef8d680d45e8fc54f34bcae359675f3f45bf558ff268>, or however you (securely) prefer. * *Feedback welcome.*
*Meet Coinbase 2.0. *In 2012, Coinbase was one of the early cool kids of the bitcoin scene. Four years later, the company is barely mentioning bitcoin as it carries out a full pivot into a digital brokerage service for a wide range of money. (Fortune <https://click.email.fortune.com/?qs=7d1cb97b08a54cd83e9621187a3d691c6f4c41aabf2d4faf0d5dc5152edf8b6da43454601c951242> )
*Facial recognition stops a Facebook burglar*: Social media companies announced they have broken ties with a controversial company that scans their streams to identify faces for police departments. But it turns out Facebook has itself used the company to stop an intruder in CEO Mark Zuckerberg's office. (The Verge <https://click.email.fortune.com/?qs=7d1cb97b08a54cd872d08c4febcfa90bb7f070383e530dad152d68503da80a24b8157083f49e31f6> )
*Ripple rocks it.* Meanwhile, another fin-tech darling is riding high. Ripple announced a successful trial with 12 big banks that could lower settlement costs for cross-border currency transactions by 60 percent. (Fortune <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8b926c40f3baacb9509a95234fae1d2f70cf4fa9c19bc24dc340cd54d0c8fd1d1> )
*How Russia doxxed the DNC*: Everyone not named Donald Trump is by now acknowledging that the hack of Democratic party emails was carried out by Russia. But just what did this entail? An Esquire feature reveals how the work was a years-long, meticulously planned operation. (Esquire <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8dadfb4f35711468176f11820de50ff6be26dd753a0e64af554a8a6fd6a3055bd> )
*I forgive you, Yahoo.* How do customers react when you suffer the largest cyber-security breach in history? Apparently, they shrug. Yahoo said user numbers are about the same since the breach. Alas, it looks like the company's merger-mate won't be so forgiving — Verizon is making noises <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8e4ce3f73f27ada49e7c1450b2e03e196d2a71f92f1b8ab350ea46b1755e41456> about bailing. (Fortune <https://click.email.fortune.com/?qs=7d1cb97b08a54cd834cd00f045ab4d96adac353fddd504810baa905548183cba4974550041879262> )
*Share today's Data Sheet with a friend: *http://fortune.com/newsletter/ datasheet/ <https://click.email.fortune.com/?qs=7d1cb97b08a54cd84b1f87e4e839e7aab2e21caa83d4fa97e79f41444df0383204cf11a1cc0ee37a>
*Looking for previous Data Sheets? Click here <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8324b9b0652d59711abbd7b378938881457bb23ab299da7f6cb46a3e7471c8909>.* . ACCESS GRANTED
*Mmmm, blockchain. Robert has a fascinating look at how Wal-Mart and IBM are using fin-tech tools to track pork safety in China: *
Walmart plans to use technology developed by the Hyperledger Project, an open source software project that builds blockchain tools and is based out of the Linux Foundation...
The blockchain in question, a private database co-developed by IBM, is designed to provide the retailer with a way to indelibly record a list of transactions indicating how meat has flowed through a commercial network, from producers to processors to distributors to grocers—and finally, to consumers. *Read more on Fortune.com <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8214e52c722f93a27eeab0e7ef33b17942ab3fbfc4d5465af9955d7968ab07503>* . FORTUNE RECON
97% of Java Apps Harbor a Known Security Hole <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8e1819d20aff867b635a2761cfc2ae0bbcbfacc2cd929d3b5ad83d2df674cb9ec> by Robert Hackett
Microsoft Cloud Warrant Cases Move Closer to Supreme Court <https://click.email.fortune.com/?qs=7d1cb97b08a54cd834cada4c548652662c55f9f90aef84f03fe10a2e5e32ee8dd737fa18bf627ee5>by Jeff John Roberts
This Badge Blocks Your Face in Social Media Photos <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8d6392e04b370ce749473b6e72fb49e3bade58f5edc22db32eab5c73b967922e9> by Maddie Farber
Half of US Adults' Faces Are Being Scanned by Law Enforcement <https://click.email.fortune.com/?qs=7d1cb97b08a54cd82a95103426d7e9e538ca57f33f09309e9078db3d043dc508bbc5dfbd96e9d4e3> by Jeff John Roberts
NSA Contractor Accused of Stealing Data Will Face Espionage Charges <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8c896e751142b7100ba647179dff103fc7c3f9f21678ae8c890020389f122f021> Fortune/Reuters .
<http://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/8484/fort/newsletter_fortunedatasheet&sz=300x250&t=pos%3D2%26tile%3D2%26day=sat&c=17511756937916> . ONE MORE THING
If you want to hack a high profile target, spear-phishing is still the best bet. But just how do you carry it out? In the case of General Colin Powell and DNC Chair John Podesta, it was a plain old "Gmail" message. Here's an up close look at what *not* to click. (*Motherboard*) . EMAIL Robert Hackett <robert.hackett@fortune.com> subscribe <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8e3c7a0604f4495fd5d26a056bbd18bc05009bd4dacbf312f534ffecc1df15108> share: [image: TW] <https://click.email.fortune.com/?qs=7d1cb97b08a54cd89a63bd3156595a18fb76a8e422aaad43de21b2717f74c0298abd3271ecf3af79> [image: FB] <https://click.email.fortune.com/?qs=7d1cb97b08a54cd86111430ea32dfe4cf2a46a8c835438ac1bf1b2c9a9ff0ee1f73f10bdca2a0859> [image: IN] <https://click.email.fortune.com/?qs=7d1cb97b08a54cd857a7b351acebcc6112bfd18e0e71e9e52278ab52bc8517e046793d085568cbe3> . This message has been sent to you because you are currently subscribed to Cyber Saturday *Unsubscribe here <https://pages.email.fortune.com/page.aspx?qs=1550dccf35ce5f7448636ad41dbb8a1de5abd7376b905facc427531013ad946e1b2e2f13cacbc49f37f69f41fc505b55992a42e7a0a08d7eff4e2a61213e3583c7575c5c47080276466dad8ecc8c455f>*
Please read our Privacy Policy, or copy and paste this link into your browser: *http://www.fortune.com/privacy <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8ba2d82a44785b34fc598c6f5a04f82650446952675a8b115c8460ae65928c990>*
For Further Communication, Please Contact: FORTUNE Customer Service 3000 University Center Drive Tampa, FL 33612-6408
*Advertising Info <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8ba2d82a44785b34fc598c6f5a04f82650446952675a8b115c8460ae65928c990> | Subscribe to Fortune <https://click.email.fortune.com/?qs=7d1cb97b08a54cd8f27fcb1e2398e728028f06c3c314ae7f9c376ae40843d8d0ab9870faf81a26e3>**Ali Hussein* *Principal* *Hussein & Associates* +254 0713 601113
Twitter: @AliHKassim
Skype: abu-jomo
LinkedIn: http://ke.linkedin.com/in/alihkassim
"Discovery consists in seeing what everyone else has seen and thinking what no one else has thought". ~ Albert Szent-Györgyi
Sent from my iPad
Begin forwarded message:
_______________________________________________ kictanet mailing list kictanet@lists.kictanet.or.ke https://lists.kictanet.or.ke/mailman/listinfo/kictanet
Unsubscribe or change your options at https://lists.kictanet.or.ke/ mailman/options/kictanet/chemukoechk%40gmail.com
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.
participants (2)
-
Ali Hussein
-
Rosemary Koech-Kimwatu