iTnews
  • Home
  • News
  • Technology
  • Security

Defence contractors stockpile exploits for cyber war

By James Hutchinson on May 17, 2012 7:00AM
Defence contractors stockpile exploits for cyber war

AusCERT warned of global cyber arms race.

The 2009 Stuxnet attack on Iran's uranium enrichment facilities pitched governments in a race to stockpile security expertise, the AusCERT conference heard this week.

According to F-Secure's chief research officer, Mikko Hypponen, governments had ramped up use of defence contractors to increase their ability to attack foreign nations through software exploits.

Hypponen noted the US' largest defence contractors seeking to fill more than 200 roles that required top secret security expertise.

Those professionals would be tasked with developing and stockpiling exploits against PCs, smartphones and enterprise systems aimed at crippling a foreign government's network, he said.

"The cyber arms race has started," Hypponen told AusCERT 2012 delegates on the Gold Coast this week.

"We're in the middle of all technically capable nations stockpiling on cyber arms for their own arsenals. Cyber arms don't last very long, they go bad or rot away as those exploits get found so they have to keep a current stockpile."

That security expertise and the exploits was being hired by those contractors on behalf of governments worldwide.

The growing attempts to build their capability online, which can be sourced as far back as 2005 according to Hypponen, also placed private security experts in a compromising situation as they decided whether to protect their clients from government-sponsored exploits.

"I don't have to think about it ... We should and we are detecting [government-made] trojans," he declared.

"That's of course a delicate subject because at the same time we are working with the government and we are working with police to hunt down online criminals. But at the same time, we can't help them with this.

"I can see why they want to use trojans, go ahead and use them, don't tell us about it. We will try to detect them."

DDoS as legal protest?

Hypponen also warned that the distributed denial of service techniques used by highly visible hactivist groups like Anonymous and LulzSec may not remain as demonised as it currently is by governments and modern legal systems.

"According to current laws in almost any country it isn't, but maybe one day it will be because [hacktivists] will grow up," he said.

The use of DDoS to protest restrictive potential laws like SOPA or PIPA appeared contradictory to Hypponen, who said it only increased the perceived need to pass such laws in order to block the source of such attacks.

However, he suggested that denial of service could ultimately be levelled with physical sit-in protests as knowledge and understanding of such groups evolved.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:
auscertauscert2012exploitsfsecuregovernmentsmikko hypponensecurity

Partner Content

Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By James Hutchinson
May 17 2012
7:00AM
0 Comments

Related Articles

  • Serious vulnerabilities found in HP printer models
  • Android apps are invasive and unsafe: study
  • Patches out for serious vulnerabilities in several VMware products
  • Mastercard's digital ID service accredited by government
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Aussie Broadband nears end of NBN PoI fibre rollout

Aussie Broadband nears end of NBN PoI fibre rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Student details, photos exposed in University of WA data breach

Student details, photos exposed in University of WA data breach

Transport for NSW exits Global Switch data centre

Transport for NSW exits Global Switch data centre

Digital Nation

Case Study: Multicloud business drivers at MLC Life Insurance
Case Study: Multicloud business drivers at MLC Life Insurance
COVER STORY: Multiple cloud models make security more complex
COVER STORY: Multiple cloud models make security more complex
Personalisation strategies need to be built from the ground up
Personalisation strategies need to be built from the ground up
COVER STORY: What happens when Google changes its algorithm?
COVER STORY: What happens when Google changes its algorithm?
Case Study: Swinburne University overhauls student management system
Case Study: Swinburne University overhauls student management system
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.