29
April
2022

Security Scene: April 2022 Edition

Subscribe for more like this

Share

By Adair Thaxton - Internet2 Cyberinfrastructure Security Engineer

Estimated reading time: 2 minutes

Security Scene is a monthly roundup of cybersecurity news highlights compiled by Internet2 Cyberinfrastructure Security Engineer Adair Thaxton. Adair connects recent headlines to security best practices, within the lens of the research and education community and our broader digital society. Plus, she’s got jokes!

Security Scene illustration with lock

OpenSSH has released version 9.0 (changelog New Window IconDecorative icon to indicate a new browser window (opens in a new window)), which has been updated to use NTRU Prime New Window IconDecorative icon to indicate a new browser window (opens in a new window), a form of lattice-based cryptography, and X25519 New Window IconDecorative icon to indicate a new browser window (opens in a new window), a 128-bit elliptic-curve function. An attacker would need to break both in order to compute the shared key. I’m not a cryptography person, but I understand a handful of those words, and this seems like important work! They’re also changing “scp” from using SCP / RCP to using SFTP. Hopefully, this is fairly transparent for us and researchers in our community.

Dark Reading has two stories (one New Window IconDecorative icon to indicate a new browser window (opens in a new window), two New Window IconDecorative icon to indicate a new browser window (opens in a new window)) about responding positively to cybersecurity oopses to cast the security team as allies instead of adversaries. They’re not advocating doing away with security training, just making it less drudgery and more fun. In large organizations (as many of you are!), that can be rather difficult, but perhaps the security team can work with one large department a month to come up with scenarios more realistic to their work, and have customized reward stickers for those who do well! I’ve said before that I’m a fan of the UK’s Cyber Games New Window IconDecorative icon to indicate a new browser window (opens in a new window) – they’re well done and fairly brief.

One of the submarine communications cables in Oahu had been subject to a remote access breach New Window IconDecorative icon to indicate a new browser window (opens in a new window), which was recently disrupted by the Department of Homeland Security. There’s no indication of how long the breach was active, but agents were able to stop it before any damage was done. A related article New Window IconDecorative icon to indicate a new browser window (opens in a new window) notes there are eight submarine cables going from Hawaii to Asia, so path diversity could be used to route around a compromised fiber. Finally, the Council on Foreign Relations notes New Window IconDecorative icon to indicate a new browser window (opens in a new window) that as the number of undersea cables and the complexity of their management increase, the attractiveness of surreptitious access to these systems is becoming a national security concern.

Things that should not be new to our community? The ongoing threat of Advanced Persistent Teenagers New Window IconDecorative icon to indicate a new browser window (opens in a new window)! Teenagers are thought to be behind the LAPSUS$ New Window IconDecorative icon to indicate a new browser window (opens in a new window) hacks. They don’t need a lot of money, they try personal emails and phones instead of just company contact info, and they’re not above a little bribery. The 2020 hack New Window IconDecorative icon to indicate a new browser window (opens in a new window) of Twitter was accomplished by a teenager, after all! Darn kids …

Read previous Security Scene blog posts