Cybersecurity

When shared services go bad

Shutterstock image (by fotogestoeber): virus infection spreading out in a network.

(Image: fotogestoeber / Shutterstock)

When it comes to agency IT, shared services are an important administration goal. There's another sort, however, that keeps a top FBI cyber official up at night.

Cyber criminals are increasingly collaborating on malware and attacks, John Riggi, section chief for cyber division outreach at the FBI, said during a presentation at the ISC2's Cyber Secure Gov conference on May 14 in Washington. He fears that terrorists and hostile states will get in on the act as well.

"Russia, China, Iran. Everyone knows about them," Riggi said. "ISIL [Islamic State in the Levant] wants to develop a cyber capability. They don't have it yet, as far as conducting computer intrusions. They have the capability to conduct some low level web defacement [at smaller, local-level sites in the U.S.], but certainly not at a national level."

"What I'm concerned about personally, what I think the government's concerned about, is that ISIL will buy the capability to conduct a sophisticated attack" because of the growth of deep-web markets for malware and other increasingly complex computer and network intrusion services, he said.

Unlike commercial networks that mostly face assault from specific types of criminals online, federal networks are beset by every kind of criminal and hostile actor, he said -- including thieves looking for monetary reward, hacktivists, terrorists and nation-sponsored espionage.

The rise of criminal shared services has been startling, he said. "The bad guys have figured out that cooperation works."

Criminals in the deep web sell all manner of malware and other capabilities to test security. "Some even have help desks, some are fee-driven," Riggi said.

He warned federal IT specialists in the audience that spearfishing is the most effective and increasingly sophisticated method of getting around cyber defenses.

Cyber criminals and other bad actors on the web are fine tuning their malicious emails using information they're getting from social media, targeting IT professionals who innocuously post information about their jobs or capabilities.

"They're looking for individuals who talk about access levels" in networks and other specifics from federal employees with critical access.

Speculation in the press that the thefts of "bulk PII [personally identifiable information]" from government and other web sites were done to mine it for individuals with critical access responsibilities might not be far-fetched, according to Riggi.

"IT people are the keys to the kingdom," he said.

The cross-currents between organized online criminals and foreign governments can amplify even criminal theft of such data, he said.

"Russian [electronic criminal] groups have a close relationship with Russian intelligence," he said. Those groups have been contracted by Russian intelligence in the past.

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at mrockwell@fcw.com or follow him on Twitter at @MRockwell4.


Featured

  • FCW PERSPECTIVES
    sensor network (agsandrew/Shutterstock.com)

    Are agencies really ready for EIS?

    The telecom contract has the potential to reinvent IT infrastructure, but finding the bandwidth to take full advantage could prove difficult.

  • People
    Dave Powner, GAO

    Dave Powner audits the state of federal IT

    The GAO director of information technology issues is leaving government after 16 years. On his way out the door, Dave Powner details how far govtech has come in the past two decades and flags the most critical issues he sees facing federal IT leaders.

  • FCW Illustration.  Original Images: Shutterstock, Airbnb

    Should federal contracting be more like Airbnb?

    Steve Kelman believes a lighter touch and a bit more trust could transform today's compliance culture.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.