Skip to content Skip to footer

Latest Cyber Bank Robbery Demonstrates That Government Prefers Crappy Tech Security for Its Own Benefit

Sloppy engineering and covert backdoors are allowed to happen.

Sloppy engineering and covert backdoors are allowed to happen.

“Software flaws account for a majority of the compromises organizations around the world experience.” —Shon Harris, CISSP Exam Guide, Sixth Edition

A gang of cyber thieves known as the Carbanak Ring recently made off with hundreds of millions of dollars in an online bank robbery that spanned the globe. They launched their caper with a salvo of malicious emails. The very fact that such a simple approach was effective demonstrates how cyber intrusions are enabled by a hi-tech sector which offloads the cost of its sloppy engineering onto the public. Never mind the industry-wide campaign of subversion conducted by government spies. Poor cyber security doesn’t just appear out of thin air. No sir, it’s baked in.

News of the theft broke a few days back in the New York Times which reported that over 100 banks in 30 countries had been hit by intruders. According to the Times they gained access to corporate networks by sending bank employees emails laced with malicious attachments. This is a technique known as phishing, or spear-phishing if the e-mail recipients are specifically targeted.

Additional facts provided by the computer forensic specialists at Moscow-based firm Kaspersky indicate that the attacker’s spear-phishing operation leveraged specially crafted Microsoft Word documents which capitalized on security holes in the Windows operating system. For technical wonks, here are the gory details:

“All observed cases used spear phishing emails with Microsoft Word 97 – 2003 (.doc) files attached or CPL files. The doc files exploit both Microsoft Office (CVE-2012-0158 and CVE-2013-3906) and Microsoft Word (CVE- 2014-1761).”

Kaspersky’s findings highlight an issue the mainstream press is loath to address. While it’s true that people often click on things they shouldn’t, like infected email attachments, having users shoulder all of the responsibility is a pointless exercise in blaming the victim. Users should be able to open documents. That’s what documents were made for: to be opened. The same holds with regard to passwords and web browser hyperlinks. Software can be implemented to enforce password complexity requirements so that users choose strong passwords. Likewise users should be able to click on web links without ending up on the receiving end of a drive-by download.

The sad truth is that cyberattacks like the one chronicled by Kaspersky flourish due to sloppy engineering. For instance, intruders commonly rely on unpatched flaws, known as zero-day bugs, to steal data and wreak havoc. It’s part of the public record that the Stuxnet worm developed by the NSA utilized multiple zero-day flaws, as did the Equation Group’s malware. So go ahead, hector users until they’re paranoid and erect all the digital safeguards you want. Malicious software payloads wielding zero-day bugs will sail through your defenses as if they weren’t even there.

One reason sub-standard engineering is so commonplace is that security isn’t a genuine priority for most high-tech vendors. It’s more of sales pitch, a branding scheme used to entice more susceptible members of the audience. Why spend money auditing code when it’s more lucrative to simply push new products out into circulation as quickly as possible?

Existing market incentives encourage this stance as high-tech vendors are allowed, by law, to treat security incidents as a negative externality. Ever wonder what’s buried in the fine print of most End User License Agreements (EULAs)? Now you know. When a bank is hacked as a result of poorly designed software, it’s the bank that pays to clean up the mess, not the software company that sold them the faulty apps. Until this changes and high-tech companies are held financially liable for their engineering screwups, we can expect the ongoing parade of massive data breaches to continue unabated.

But there’s another more sinister reason why cyber security sucks: private sector monoliths like RSA collaborate with spies to construct hidden backdoors. In an effort to steal secrets, the spies at Fort Meade have worked with major American high-tech companies and gotten them to embed subtle yet intentional flaws in their products.

Some of these backdoors go all the way down to the hardware, where they’re accessed using obscure firmware hacks. As someone who has built rootkits, I can attest that the hardware-level stuff is nasty: it can bridge air-gaps, successfully resist eradication and persist across multiple platforms. The underlying attack vector is so powerful that strong encryption is of little protection. If U.S. spies can manipulate a machine’s firmware, as described in leaked NSA documents, swiping an encryption passcode is a cakewalk.

It’s ironic that U.S. officials complained loudly about Chinese companies embedding backdoors in their products when classified documents reveal the United States is a truly prolific actor in this domain. During the uproar following the first round of Snowden leaks, President Obama made symbolic gestures about changing the NSA’s predilection for zero-day bugs only to leave a gaping loophole for cases which demonstrated “a clear national security or law enforcement need.”

So if you’re wondering what’s behind the never-ending stream of high-profile cyber-attacks? Bad security isn’t an unfortunate accident. It’s a matter of official policy. A top-down scheme that benefits a small circle of spies at the expense of society’s collective well-being. Computer security for the 1%.

Truthout Is Preparing to Meet Trump’s Agenda With Resistance at Every Turn

Dear Truthout Community,

If you feel rage, despondency, confusion and deep fear today, you are not alone. We’re feeling it too. We are heartsick. Facing down Trump’s fascist agenda, we are desperately worried about the most vulnerable people among us, including our loved ones and everyone in the Truthout community, and our minds are racing a million miles a minute to try to map out all that needs to be done.

We must give ourselves space to grieve and feel our fear, feel our rage, and keep in the forefront of our mind the stark truth that millions of real human lives are on the line. And simultaneously, we’ve got to get to work, take stock of our resources, and prepare to throw ourselves full force into the movement.

Journalism is a linchpin of that movement. Even as we are reeling, we’re summoning up all the energy we can to face down what’s coming, because we know that one of the sharpest weapons against fascism is publishing the truth.

There are many terrifying planks to the Trump agenda, and we plan to devote ourselves to reporting thoroughly on each one and, crucially, covering the movements resisting them. We also recognize that Trump is a dire threat to journalism itself, and that we must take this seriously from the outset.

After the election, the four of us sat down to have some hard but necessary conversations about Truthout under a Trump presidency. How would we defend our publication from an avalanche of far right lawsuits that seek to bankrupt us? How would we keep our reporters safe if they need to cover outbreaks of political violence, or if they are targeted by authorities? How will we urgently produce the practical analysis, tools and movement coverage that you need right now — breaking through our normal routines to meet a terrifying moment in ways that best serve you?

It will be a tough, scary four years to produce social justice-driven journalism. We need to deliver news, strategy, liberatory ideas, tools and movement-sparking solutions with a force that we never have had to before. And at the same time, we desperately need to protect our ability to do so.

We know this is such a painful moment and donations may understandably be the last thing on your mind. But we must ask for your support, which is needed in a new and urgent way.

We promise we will kick into an even higher gear to give you truthful news that cuts against the disinformation and vitriol and hate and violence. We promise to publish analyses that will serve the needs of the movements we all rely on to survive the next four years, and even build for the future. We promise to be responsive, to recognize you as members of our community with a vital stake and voice in this work.

Please dig deep if you can, but a donation of any amount will be a truly meaningful and tangible action in this cataclysmic historical moment.

We’re with you. Let’s do all we can to move forward together.

With love, rage, and solidarity,

Maya, Negin, Saima, and Ziggy