The Internet Cannot be Defended from the PRC

Written by

Geoff Halstead

Published on

Reading time

4 min.

The NSA release this week a comprehensive report with explicit details of the extent of the activity and ‘Tradecraft” of the APT 40 unit of the PRC. This is just confirmation of what we already know – and was addressed by both FBI Director Christopher Wray and NSA Chief General Timothy Haugh in testimony to congress this summer. But now all of the details of PRC activities and tradecraft are explicitly laid out.

The CSA describes how APT 40 can rapidly exploit new public vulnerabilities in widely used software. Additionally, the group has evolved its tradecraft and embraced a global trend to use compromised devices, including home office devices, as operational infrastructure. Other PRC state-sponsored actors are using the same techniques, posing a threat to networks worldwide.

Notably, APT40 possesses the capability to rapidly transform and adapt exploit proof-of-concept(s)
(POCs) of new vulnerabilities and immediately utilise them against target networks possessing the
infrastructure of the associated vulnerability. APT40 regularly conducts reconnaissance against networks of interest, including networks in the authoring agencies’ countries, looking for opportunities to compromise its targets. This regular reconnaissance postures the group to identify vulnerable, end-of-life or no longer maintained devices on networks of interest, and to rapidly deploy exploits. APT40 continues to find success exploiting vulnerabilities from as early as 2017.

The level of detail and disclosure in itself is new and important. As Gary Miller, Faction Advisor and Founder of the Mobile Intelligence Alliance puts it:

This is a big deal. We monitor APT40 spyware and the NSA posting this overview as an international multi-agency report is a significant milestone.

The Bottom Line: The Internet is NOT Safe

As we have said: The System is Blinking Red

We entered a new era of cybersecurity over a decade ago where it not just criminal gangs that want your data. Three things have made this even worse in recent years:

  1. AI – gives even more power to the attackers, who are always 3 steps ahead.
  2. IOT – we are connecting all manner of critical devices and infrastructure to the Internet.
  3. Great Power Conflict – we are now dealing with hostile nation-state actors engaged in ongoing low-level cyberwarfare, while actively working and preparing to wreak havoc across our society and economy on a scale not seen before – should the need arise.

The assumptions upon which cybersecurity architectures have been designed are based on a ‘good enough’ approach that simply does not apply to the world we now live in. We need a fundamentally new approach built on a truly Zero Trust architecture. That’s what Faction is dedicated to: it’s critical, and the time is well past now for this to happen.

The Solution? Get Off the Internet and Into a Virtual Private Circuit

This paragraph caught our eye:

The CSA also details findings from the ASD’s investigations into the successful compromise of two organizations’ networks by the cyber actor group, including the key activities observed. It describes mitigations network defenders can take, including implementing comprehensive and historical logging, promptly patching all Internet exposed devices, segmenting networks to limit or block lateral movement, closely monitoring services to ensure they are well secured, and disabling unused or unnecessary network services, ports, and protocols.

Faction addresses everything on that list except the logging and updating patches. We can ensure that updates and patches are only done with your permission and active control, however – which is critical. Faction also can and will add robust logging, reporting and alerts inside of Faction Networks with dashboards for our business customers using our Virtual Private Circuits. The difference between us and everyone else is that NOBODY else has access to the data that populates this dashboard. Only the Network Owner – and users he or she designates – can access this in your private Faction Network.

But if you are behind a Faction Network you are protected until you do.  And that’s a huge benefit.  What happens when a flaw is reported and patches released is that many if not most companies are slow to update them.  That’s exactly how Change Healthcare got hacked How Could This Happen?! A Deep Dive into the Change Healthcare Attack – Faction Networks

At Faction, Zero Trust means ZERO Trust. We start by wiping the slate clean, ensuring that no user or device can see or even route to your Virtual Private Circuit over the Internet. Literally, if you expect to have any ability to prevent attacks, you need to get off the Internet!

But then you may say: “I can’t do that – we all have to connect to the Internet, right?!“ Wrong. You need to connect OVER the Internet to specific:

  • cloud servers and resources;
  • PCs, computers, smartphones;
  • and smart, dumb and legacy devices.

With a Virtual Private Circuit, you can do all of that. But you do it over and through an encrypted private network and tunnels that only YOU created, control and can grant access to. That won’t solve everything, but it at least gives the defense the advantage over attackers for the first time. Most critically of all, it give you, the network owner, they keys to control your own security.

Read the NSA Report:

Related Blogs

WiFi

Alert: Two major flaws expose WiFi networks to attack, affects billions of users

Reading Time: 5 min.

Summary Two major flaws in open-source software could enable bad actors to break into password-protected home and enterprise WiFi networks. The…

Read more

The Internet Cannot be Defended from the PRC

Reading Time: 4 min.

The NSA release this week a comprehensive report with explicit details of the extent of the activity and ‘Tradecraft” of…

Read more
Keep It Simple

KISS: Keep It Simple Security

Reading Time: 7 min.

Faction Networks changes the paradigm and enables K.I.S.S. by going back to the foundation of actually securing networking, and then…

Read more
Linux XYZ Utils Back Door

The System is Blinking Red

Reading Time: 6 min.

The “Good Enough” strategy in Cyber Security is not going to cut it any more. The time frame here is…

Read more

How Could This Happen?! A Deep Dive into the Change Healthcare Attack

Reading Time: 11 min.

It’s not an aberration – it WILL happen again As many of you have no doubt heard or read about,…

Read more
Food Manufacturing

Not Just ‘Factories’ – 40% of Food & Beverage Manufacturers Impacted by Ransomware Attack

Reading Time: 1 min.

JSB Foods ransomware incident just a prominent example According to Claroty, more than 40% of food and beverage-sector respondents had…

Read more
Hacking data

Why a 2nd Class Air National Guardsman Could Read the Pentagon’s Briefings on Ukraine’s War Plan

Reading Time: 3 min.

Most people by now have heard of Jack Teixeira, or if not at least the infamous story of how a…

Read more
Smart UPS Devices

Uninterruptible Power Supply (UPS) Devices In the Bullseye for Hackers

Reading Time: 2 min.

Weak Protocols and Built-in Back Doors Make These Inviting Targets The Cybersecurity and Infrastructure Security Agency (CISA) and the Department…

Read more

Nobody Would Have Agreed to This

Reading Time: 9 min.

Even George Orwell Could Not Have Imagined the World We Live in Today Let’s Start with a Thought Experiment If…

Read more

5 Easy Cybersecurity Steps to Radically Reduce Your Risk NOW

Reading Time: 9 min.

For most small to mid-sized business owners, just keeping business and operations running is the primary concern. When one looks…

Read more

Warning: Undefined array key 0 in /var/www/factionnetworks/wp-content/themes/bricks/includes/elements/code.php(216) : eval()'d code on line 19

Warning: Attempt to read property "cat_ID" on null in /var/www/factionnetworks/wp-content/themes/bricks/includes/elements/code.php(216) : eval()'d code on line 19

Warning: Undefined array key 0 in /var/www/factionnetworks/wp-content/themes/bricks/includes/elements/code.php(216) : eval()'d code on line 20

Warning: Attempt to read property "cat_name" on null in /var/www/factionnetworks/wp-content/themes/bricks/includes/elements/code.php(216) : eval()'d code on line 20

The Internet Cannot be Defended from the PRC

The NSA release this week a comprehensive report with explicit details of the extent of the activity and ‘Tradecraft” of the APT 40 unit of the PRC. This is just confirmation of what we already know – and was addressed by both FBI Director Christopher Wray and NSA Chief General…

Reading Time: 4 min.

The NSA release this week a comprehensive report with explicit details of the extent of the activity and ‘Tradecraft” of the APT 40 unit of the PRC. This is just confirmation of what we already know – and was addressed by both FBI Director Christopher Wray and NSA Chief General Timothy Haugh in testimony to congress this summer. But now all of the details of PRC activities and tradecraft are explicitly laid out.

The CSA describes how APT 40 can rapidly exploit new public vulnerabilities in widely used software. Additionally, the group has evolved its tradecraft and embraced a global trend to use compromised devices, including home office devices, as operational infrastructure. Other PRC state-sponsored actors are using the same techniques, posing a threat to networks worldwide.

Notably, APT40 possesses the capability to rapidly transform and adapt exploit proof-of-concept(s)
(POCs) of new vulnerabilities and immediately utilise them against target networks possessing the
infrastructure of the associated vulnerability. APT40 regularly conducts reconnaissance against networks of interest, including networks in the authoring agencies’ countries, looking for opportunities to compromise its targets. This regular reconnaissance postures the group to identify vulnerable, end-of-life or no longer maintained devices on networks of interest, and to rapidly deploy exploits. APT40 continues to find success exploiting vulnerabilities from as early as 2017.

The level of detail and disclosure in itself is new and important. As Gary Miller, Faction Advisor and Founder of the Mobile Intelligence Alliance puts it:

This is a big deal. We monitor APT40 spyware and the NSA posting this overview as an international multi-agency report is a significant milestone.

The Bottom Line: The Internet is NOT Safe

As we have said: The System is Blinking Red

We entered a new era of cybersecurity over a decade ago where it not just criminal gangs that want your data. Three things have made this even worse in recent years:

  1. AI – gives even more power to the attackers, who are always 3 steps ahead.
  2. IOT – we are connecting all manner of critical devices and infrastructure to the Internet.
  3. Great Power Conflict – we are now dealing with hostile nation-state actors engaged in ongoing low-level cyberwarfare, while actively working and preparing to wreak havoc across our society and economy on a scale not seen before – should the need arise.

The assumptions upon which cybersecurity architectures have been designed are based on a ‘good enough’ approach that simply does not apply to the world we now live in. We need a fundamentally new approach built on a truly Zero Trust architecture. That’s what Faction is dedicated to: it’s critical, and the time is well past now for this to happen.

The Solution? Get Off the Internet and Into a Virtual Private Circuit

This paragraph caught our eye:

The CSA also details findings from the ASD’s investigations into the successful compromise of two organizations’ networks by the cyber actor group, including the key activities observed. It describes mitigations network defenders can take, including implementing comprehensive and historical logging, promptly patching all Internet exposed devices, segmenting networks to limit or block lateral movement, closely monitoring services to ensure they are well secured, and disabling unused or unnecessary network services, ports, and protocols.

Faction addresses everything on that list except the logging and updating patches. We can ensure that updates and patches are only done with your permission and active control, however – which is critical. Faction also can and will add robust logging, reporting and alerts inside of Faction Networks with dashboards for our business customers using our Virtual Private Circuits. The difference between us and everyone else is that NOBODY else has access to the data that populates this dashboard. Only the Network Owner – and users he or she designates – can access this in your private Faction Network.

But if you are behind a Faction Network you are protected until you do.  And that’s a huge benefit.  What happens when a flaw is reported and patches released is that many if not most companies are slow to update them.  That’s exactly how Change Healthcare got hacked How Could This Happen?! A Deep Dive into the Change Healthcare Attack – Faction Networks

At Faction, Zero Trust means ZERO Trust. We start by wiping the slate clean, ensuring that no user or device can see or even route to your Virtual Private Circuit over the Internet. Literally, if you expect to have any ability to prevent attacks, you need to get off the Internet!

But then you may say: “I can’t do that – we all have to connect to the Internet, right?!“ Wrong. You need to connect OVER the Internet to specific:

  • cloud servers and resources;
  • PCs, computers, smartphones;
  • and smart, dumb and legacy devices.

With a Virtual Private Circuit, you can do all of that. But you do it over and through an encrypted private network and tunnels that only YOU created, control and can grant access to. That won’t solve everything, but it at least gives the defense the advantage over attackers for the first time. Most critically of all, it give you, the network owner, they keys to control your own security.

Read the NSA Report:

If you liked this post, Share it on: