Metsola und die Cyberdingens

06. Februar 2024

Die Rus­sen kommen!

Sor­ge vor rus­si­schem Angriff auf Europawahlen

Das Haus ent­hebt sei­nen IT-Sicherheitschef des Amtes. Er habe zu wenig gegen Cyber­an­grif­fe getan. Par­al­lel dazu meh­ren sich nach dem Auf­flie­gen einer let­ti­schen Abge­ord­ne­ten Berich­te über inter­ne rus­si­sche Spitzel.

Brüs­sel. Vier Mona­te vor den Euro­pa­wah­len tauscht das Euro­pa­par­la­ment sei­nen zustän­di­gen Beam­ten für Cyber­si­cher­heit aus. Der Lei­ter der IT-Abteilung des Hau­ses, Pas­cal Pari­dans, wer­de dem­nächst zurück­tre­ten, habe das Prä­si­di­um des Par­la­ments beschlos­sen, berich­tet das Nach­rich­ten­ma­ga­zin „Poli­ti­co“ am Mon­tag. Schon im Dezem­ber hat­te es über einen inter­nen Bericht des Par­la­ments berich­tet, dem­zu­fol­ge die Cyber­si­cher­heit des Hau­ses „noch nicht bran­chen­üb­li­che Stan­dards erfüllt“ und „nicht völ­lig auf der Höhe des Bedro­hungs­ni­veaus“ ist, das von staat­lich unter­stütz­ten Hackern und ande­ren feind­se­lig gesinn­ten Grup­pie­run­gen ausgehe.

src: click (Die Presse)

Was, der hat nur gepatcht und kei­ne neu­en Anti­vi­ren­lö­sun­gen repu­ta­bler US Part­ner ein­ge­kauft? Was nur nen fal­se sen­se of secu­ri­ty vor­gau­kelt, denn bei tar­ge­ted attacks meist nutzlos.

Was, der hat nur gepatcht und kein Echt­zeit­traf­fic­mo­ni­to­ring ein­ge­setzt, das nen fal­se sen­se of secu­ri­ty vor­täuscht - weil mia ham ja eh kei­ne Warn-SMS kriegt?

Was der hat nicht gepatcht?

Was denn jetzt?

Hm… lesen wir mal den Originalartikel…

Also - berich­tet Poli­ti­co am Mon­tag… Hmm, komisch, kein Arti­kel vom Mon­tag in dem Poli­ti­co das berich­tet, aber wir sind hier beim öster­rei­chi­schen Qua­li­täts­jour­na­lis­mus - also wars wohl mehr der Frei­tag vorm Montag…

FEBRUARY 2, 2024 1:00 PM CET
BY ANTOANETA ROUSSI

The Euro­pean Parliament’s chief cyber­se­cu­ri­ty offi­cial will lea­ve his post ear­ly, just mon­ths befo­re the June elec­tions, amid cri­ti­cism that the assem­bly is struggling to cope with incre­a­sing cyberthreats. 

src: click

Grund:

POLITICO repor­ted in Decem­ber that an inter­nal review show­ed that the Euro­pean Parliament’s cyber­se­cu­ri­ty “has not yet met indus­try stan­dards” and is “not ful­ly in-line with the thre­at level” posed by state-sponsored hackers and other thre­at groups.

Ori­gi­nal Report:

The Euro­pean Parliament’s IT depart­ment pre­sen­ted a report to a group of key mem­bers of the Euro­pean Par­lia­ment (MEPs) ear­lier this mon­th, warning that state-sponsored attacks on the Par­lia­ment have beco­me more nume­rous and more sophisti­ca­ted sin­ce its last elec­tion in 2019.

The num­ber of cyber­at­tacks on EU insti­tu­ti­ons “is incre­a­sing shar­ply,” said the report, dated Novem­ber 29, and the EU should pre­pa­re “to face simi­lar thre­ats” as poli­ti­ci­ans, par­lia­ments and governments across Euro­pe have faced in recent years.

The insti­tu­ti­on is also more vul­nerable due to its shift to more remo­te work during the pan­de­mic, it added.

Several offi­cials and elec­ted mem­bers invol­ved in Parliament’s pre­pa­ra­ti­ons against cyber­at­tacks tar­ge­ting next year’s elec­tion war­ned in sepa­ra­te con­ver­sa­ti­ons that the institution’s defen­ses were weak and could break.

We’­re stan­ding with our bare bot­toms out and if anyo­ne wants to hack us, like any Chi­ne­se thre­at actor or any sta­te actor, they can,” said a staff mem­ber at the Euro­pean Par­lia­ment admi­nis­tra­ti­on, gran­ted anony­mi­ty due to the sen­si­ti­vi­ty of the topic.

Pro-Russian hack­ti­vist groups like Kill­net have also plagued Euro­pean governments with con­stant annoyan­ces, most­ly through dis­tri­bu­t­ed denial-of-service attacks (DDoS) brin­ging down online ser­vices. Last year, the Euro­pean Par­lia­ment web­site faced a “sophisti­ca­ted” attack dis­rup­t­ing its ser­vices moments after mem­bers voted to decla­re Rus­sia a sta­te spon­sor of ter­ro­rism. Simi­lar inci­dents have hit natio­nal insti­tu­ti­ons too.

With six mon­ths to go befo­re the Euro­pean Par­lia­ment elec­tion, the fear is a repeat of ear­lier elec­tion hacks.

Uni­que­ly vulnerable

The EU elec­tion — in which voters across 27 coun­tries elect new Euro­pean Par­lia­ment mem­bers — are uni­que­ly vul­nerable to attacks. In effect, the elec­tion is 27 par­al­lel voting pro­ces­ses taking place at once, all with dif­fe­rent infra­st­ruc­tu­re and pro­tec­tions. It could take just one suc­cess­ful dis­rup­ti­on of a natio­nal elec­to­ral sys­tem to cast doubt on the ent­i­re new parliament.

Parliament’s report high­ligh­ted a ran­ge of risks: influ­en­cing public opi­ni­on on spe­ci­fic can­di­da­tes through dis­in­for­ma­ti­on; cyber­at­tacks on natio­nal voting sys­tems; cyber­at­tacks tar­ge­ting the major poli­ti­cal deba­tes at EU and natio­nal level; and attacks tar­ge­ting the EU Parliament’s own elec­tion night pro­cess itself.

At risk are inter­nal accounts, data and cor­re­spon­dence of mem­bers of par­lia­ment, which can be used to pres­su­re poli­ti­ci­ans or dis­rupt elec­tion cam­pai­gns. Hackers could also seek to com­pro­mi­se the voting, coun­ting and infor­ma­ti­on sys­tems used in the elec­tions to dis­credit or dupe results.

Com­pro­mi­sing accounts could also help gain access to natio­nal poli­ti­cal sys­tems or to data on other EU insti­tu­ti­ons. “In the last two years we’ve intro­du­ced two-factor authen­ti­ca­ti­on bet­ween insti­tu­ti­ons,” a par­lia­men­ta­ry assi­stant said. “Befo­re you were just able to log into one insti­tu­ti­on and you could enter all others.”

One issue Par­lia­ment is grap­p­ling with is the institution’s scat­te­red cyber­se­cu­ri­ty struc­tures. Each poli­ti­cal group is a litt­le island that hand­les its own IT infra­st­ruc­tu­re and sup­port. During elec­tion cam­pai­gns, natio­nal and pan-European poli­ti­cal par­ties also take a more cen­tral role in coor­di­na­ting the pro­cess, fur­ther com­pli­ca­ting con­trol and administration.

Ano­t­her stumb­ling block is hiring cyber­se­cu­ri­ty staff. “You get rough­ly one staff [IT] mem­ber for every three mem­bers of the Euro­pean Par­lia­ment, so smal­ler groups are less pro­tec­ted,” one Par­lia­ment offi­cial said.

Ram­ping up to stop the hacks
Insi­de Par­lia­ment, offi­cials are in a race against time to shore up cyber defen­ses quickly. 

The Euro­pean Par­lia­ment in its report said it will hire 40 new cyber­se­cu­ri­ty experts and incre­a­se the bud­get of the cyber­se­cu­ri­ty direc­to­ra­te to €7 mil­li­on in 2024 from €5 mil­li­on this year, and up to €8.5 mil­li­on in 2025. So far, 20 have been eit­her recrui­ted or offe­red the job.

Ehmm..

Ehm uni­que risk profile!

- DDOS!

- Hacking remo­te access VPNs! (working from home incre­a­sed the attack vector)

- Hacking the Vote Coun­ting Mechanism!

- Two fac­tor sol­ved the insti­tu­ti­ons account sepa­ra­ti­on issue!

It did what?!

- Hacking sen­si­ti­ve data!

- Gai­ning data­ba­se access!

- Mani­pu­la­ting elections!

- Under­mi­ning voter trust!

- Voter manipulation!

- Account hacking!

- Defa­cing EU Par­lia­ment websites!

Ok, I’m sor­ry I asked - aber gehts ein wenig genau­er als “ALL THE THREATS!?”

This year, the con­sul­tant firm Pri­ce­Wa­ter­house­Coo­pers (PWC) per­for­med at least one exter­nal tech­ni­cal pene­tra­ti­on test on the Par­lia­ment: i.e. a secu­ri­ty assess­ment of the organization’s digi­tal peri­me­ter. The results are strict­ly pro­tec­ted even to DG ITEC staff, with only few offi­cials having access to them.

Ah, nein, gehts nicht - weil der report ist ja confidential.

Bart Groot­huis, a Dut­ch Libe­ral law­ma­ker and cyber­se­cu­ri­ty expert, said he’d asked for a “ful­ly fled­ged third par­ty assess­ment” inclu­ding inci­dent respon­se and inci­dent hand­ling. “Third par­ties make sure that you do the right things becau­se if you do it yourself, then poli­tics come into play,” said Groot­huis. “A third par­ty which has no inte­rest whatsoever has the abi­li­ty to look real­ly free­ly and assess what is real­ly necessary.”

Mean­while, the EU’s Agen­cy for Cyber­se­cu­ri­ty (ENISA) and the Com­mis­si­on held an elec­to­ral trai­ning exer­cise in Parliament’s pre­mi­ses in Novem­ber. That exer­cise gathe­red more than 100 par­ti­ci­pants lar­ge­ly from natio­nal cyber and elec­to­ral aut­ho­ri­ties, with the idea to impro­ve coun­tries’ respon­ses to cyber attacks.

Parliament’s cyber­se­cu­ri­ty ser­vices plan to exer­cise “their hig­hest vigi­lan­ce” during the week of the Euro­pean elec­tion, which will run from June 6-9 next year, the report said, and ser­vices will remain on high alert until a new EU Com­mis­si­on is instal­led, it said.

The insti­tu­ti­on alrea­dy rol­led out a spy­wa­re detec­tion tool that allows mem­bers to scan their pho­nes for known traces of intru­si­ve soft­ware. It made the ser­vice avail­ab­le to all MEPs and staff, the report said.

Aber fürch­tet euch nicht, sie haben Viren­scan­ner für die Han­dies ein­ge­kauft! Die die MEPs selbst bedie­nen dürfen!

Und sie haben geplant ein Trend moni­to­ring einzuführen!

The insti­tu­ti­on also plans to cir­cu­la­te “elec­tion hacking memos,” which will warn about new methods and trends which could threa­ten elec­tion secu­ri­ty, and EU poli­ti­ci­ans can also rely on the CERT-EU unit for a tool that spots and flags dis­in­for­ma­ti­on attempts like fake social media accounts and mali­cious social media acti­vi­ty, the report added.

Hey du, mei­ne Wahl wur­de gera­de gehackt, sei vor­sich­tig, da geht die­ser Trend um!

Gut, also Pro­blem iden­ti­fi­ziert - wie lösen wirs?

Ano­t­her stumb­ling block is hiring cyber­se­cu­ri­ty staff. “You get rough­ly one staff [IT] mem­ber for every three mem­bers of the Euro­pean Par­lia­ment, so smal­ler groups are less pro­tec­ted,” one Par­lia­ment offi­cial said.

Ah, zu wenig Geld allo­ziert (8000 staff, 200 IT staff, also one per 40, while - the average ratio across all sec­tors and com­pa­ny sizes is one IT worker for every 27 employees), wie kön­nen wir denn da - ah ich weiß was!

Das Haus ent­hebt sei­nen IT-Sicherheitschef des Amtes. Er habe zu wenig gegen Cyber­an­grif­fe getan.

Gut, gehen wir mal davon aus dass das alle EU Insti­tu­tio­nen kom­plett kom­pro­mit­tiert sind, aber kei­ne staat­li­che Hacker­bu­de Inter­es­se dar­an hat die EU Wah­len über einen direk­ten Hack zu mani­pu­lie­ren und dabei erwischt zu wer­den - wie sieht denn das risk pro­fi­le abge­se­hen von den EU Wah­len so aus?

EU capi­tals fear Rus­si­an reta­lia­ti­on and cyber­at­tacks after asset freezes

src: click

I’m sor­ry I asked.









Hinterlasse eine Antwort