Back to news

April 27, 2020 | International, Aerospace, Naval, Land, C4ISR, Security

In chaos, there’s opportunity … and that’s bad news

James Yeager

This year is only four months old and it's already one for the history books — and not in a great way.

As the defense community works in tandem with the broader government to keep citizens safe and healthy, cybersecurity threats are only becoming more aggressive.

If we've learned anything about cyber adversaries, it's that they will seize on any opportunity to gain an advantage in targeting their victims, including exploiting the fears of the public during a global pandemic. As COVID-19 has moved from the East to the West, adversaries have followed suit, using lures that play into people's desperation for information on the disease. In “The Art of War,” Sun-Tzu said“In the midst of chaos, there is also opportunity.”

The COVID-19 virus is infecting more than just people. The pandemic has created chaos and handed adversaries an irresistible opportunity to exploit the situation to gain entry into our networks, whether that's to steal intellectual property, disrupt operations, or gain a strategic advantage if they are a nation-state actor.

Already, we are seeing an increase in phishing campaigns using COVID-19 as a hook to launch malware in emails disguised as alerts. Particularly vulnerable are the thousands of remote workers — government employees and contractors alike — who are using their own home networks, which are largely less sophisticated and secure than their work environments.

The stakes are high, particularly for those in defense jobs, where an errant click can have devastating consequences. Coincidently, 2020 is the year when the DoD's Cybersecurity Maturity Model Certification has grown teeth and will force more than 300,000 defense contractors to up their cybersecurity game or face bottom-line consequences. Now is not the time to make mistakes.

In CrowdStrike's recent Global Threat Report, we captured and analyzed real-world inputs from observed trends in cyber-attacks on commercial and government enterprises. The following are some of the notable attack vectors and trends we observed across the public sector during 2019:

  • An escalation in ransom demands, including ransomware attacks on defense supply chain providers, schools and local municipalities.
  • Surpassing the volume of malware attacks are malware-free attacks that use code which executes from memory or stolen login credentials.
  • Continued state-sponsored targeted intrusions aimed at the government and defense sector. In fact, we have witnessed adversaries exploiting fear around COVID-19 to socially engineer their way to user credentials and sensitive data.

In the months ahead, I contend we'll see many more of the same tactics from the same bad actors: Russia, China and newer players on the block, such as Iran, which has leveraged U.S. social media platforms to develop information operations campaigns.

Amidst massive change, periodic chaos and long-term disruption, the defense community — government and industry — must put a premium on speed. Speed to detect. Speed to investigate. Speed to mitigate. We recommend that agencies and companies implement cybersecurity practices that follow the 1-10-60 Rule: detect intrusions within 1 minute; investigate and gain a comprehensive understanding of the attack within 10 minutes; and contain and remove the threatening adversary from the network within 60 minutes.

This benchmark will limit the damage caused by inevitable attacks. Yes, inevitable. Cyberattacks are a constant and while building a bigger, wider and thicker wall may help keep bad actors out, they are persistent and determined enough to eventually get in, and when they do, you're on the clock.

This year will only get worse as the impacts of COVID-19 will be deep, damaging and long-lasting. We're all faced with loss and uncertainty as we attempt to recover from the global pandemic. For the defense community, there is no time to recover and regroup. You are already on the clock, as those who wish to do our nation harm are already hard at work.

https://www.fifthdomain.com/opinion/2020/04/24/in-chaos-theres-opportunity-and-thats-bad-news/

On the same subject

  • ManTech wins IT contract to support US Navy ship maintenance

    July 23, 2020 | International, Naval

    ManTech wins IT contract to support US Navy ship maintenance

    Andrew Eversden WASHINGTON — ManTech has won an $87 million contract for IT work on U.S. Naval Sea Systems Command's ship maintenance mission, the company announced July 22. Under the five-year contract, ManTech will support the Navy Maritime Maintenance Enterprise Solution, or NMMES, run by NAVSEA. ManTech will provide the command with advanced IT software research, development and engineering, according to a news release. The defense contractor will “accelerate cost-efficient software development cycle times, speeding maintenance activity access to the highest quality high-technology solutions with greater leverage on an expansive data library,” the release said. “ManTech will improve the quality, integration and efficiency of the NMMES architecture to enhance ship maintenance operations and improve readiness for the Navy's most critical surface and submarine platforms,” said Andy Twomey, ManTech executive vice president and general manager of the defense sector. The executive added that the solutions include robotic process automation, agile DevSecOps software modeling and artificial intelligence-automated cybersecurity. NNMES is an IT system used for ship repair at its four public shipyards: Norfolk, Virginia; Portsmouth, Virginia; Puget Sound, Washington; and Pearl Harbor, Hawaii. The award was made under the Department of Defense Information Analysis Center's multiple award contract vehicle, which is awarded by the Air Force Installation Contracting Center for work with various military organizations https://www.c4isrnet.com/battlefield-tech/it-networks/2020/07/22/mantech-wins-it-contract-to-support-us-navy-ship-maintenance/

  • Bell Pushes V-280 Gunship, Shipboard Variants: Recon In Works

    August 6, 2018 | International, Aerospace

    Bell Pushes V-280 Gunship, Shipboard Variants: Recon In Works

    One variant, in Army colors, has missile racks sticking out of what was originally the passenger cabin — a conversion that units could potentially install or remove as needed in the field. The other, with Marine Corps markings, is a sleeker thoroughbred gunship with internal weapons bays, stealth features, and folding wings to fit in shipboard hangars. By SYDNEY J. FREEDBERG JR. ARLINGTON: How new is Bell Helicopter's shiny showroom — excuse me, Advanced Vertical Lift Center — minutes from the Pentagon and the Capitol? Between the time I arrived this morning and the time I headed out, they installed two huge mockups of their high-speed V-280 Valor tilrotor. But these aren't land-based troop transports like the prototype Bell's already flying for the Joint Multi-Role (JMR) demonstration program. They're heavily armed gunships. One, in Army colors, has missile racks sticking out of what was originally the passenger cabin — a conversion that units could potentially install or remove as needed in the field. The other, with Marine Corps markings, is a sleeker thoroughbred gunship with internal weapons bays, stealth features, and folding wings to fit in shipboard hangars. Bell showed off these mockups before, but there's almost no imagery available online, so when executives said I was free to take photos, I had my phone out at once. Equally interesting was what they said about another design they've still got under wraps: Bell's contender for the Army Future Attack Reconnaissance Aircraft(FARA), a scout light, small, and agile enough to avoid detection by flying down city streets. https://breakingdefense.com/2018/08/bell-pushes-v-280-gunship-shipboard-variants-recon-in-works/

  • Ireland's Watchdog Launches Inquiry into Google's AI Data Practices in Europe

    September 12, 2024 | International, C4ISR, Security

    Ireland's Watchdog Launches Inquiry into Google's AI Data Practices in Europe

    Irish Data Protection Commission launches inquiry into Google's AI model PaLM 2, investigating GDPR compliance in personal data processing for AI dev

All news