INTERPOL launches awareness campaign on COVID-19 cyberthreats

In response to the rapidly changing cybercrime landscape during the COVID-19 pandemic, the global law enforcement and cybersecurity communities have formed an alliance to protect the public.

Harnessing the expertise of this alliance, INTERPOL has launched a global awareness campaign to keep communities safe from cybercriminals seeking to exploit the outbreak to steal data, commit online fraud or simply disrupt the virtual world.

The key message of the campaign, which focuses on alerting the public to the key cyberthreats linked to the coronavirus pandemic, is to #WashYourCyberHands to promote good cyber hygiene.

The campaign will focus on social media outreach, highlighting the top threats that INTERPOL has identified based on the data collected from its member countries, private industry partners, national cybersecurity agencies and online information-sharing groups.

Analysis of this data has confirmed that cybercriminals are capitalizing on the anxiety caused by COVID-19 through various cyberattacks such as data-harvesting malware, ransomware, online scams and phishing.

Threats targeting people working from home during the global lockdowns will also be addressed, along with prevention tips for companies.

Basic cyber hygiene advice – how to ‘wash your cyber hands’ – will be provided throughout the four-week (4 – 31 May) campaign, to ensure that individuals and businesses are equipped with the knowledge of how to protect their systems and data.

Law enforcement agencies around the world and key global cybersecurity actors will share the messages of the campaign to reach the widest possible global audience.

Craig Jones, INTERPOL’s Director of Cybercrime, said police and the cybersecurity industry have seen a considerable increase in the number of targeted cyberattacks by criminals since the virus outbreak began. These range from malicious web domains using the word ‘covid’ to phishing emails promising the sale of key supplies as well as ransomware attacks against critical infrastructure and hospitals.

“Cybercriminals are diversifying attack vectors to launch cyberattacks exploiting the COVID-19 outbreak. These cyberthreats are causing serious harm to people and organizations, which exacerbate an already dire situation in the physical world. Now is the time when we all must come together to stop them,” said Mr Jones.

“Cybercrime and cybersecurity may seem like a complex issue that is difficult to understand unless you are an expert in the field – this is not the case. INTERPOL’s campaign aims to demystify these cyberthreats and offer simple, concrete steps which everybody can take to protect themselves,” he concluded.

The campaign kicked off with the publication of a document on the ‘Global landscape on the COVID-19 cyberthreats’ which outlines the latest threats identified, expected future trends and INTERPOL’s response.

UK and US Security Agencies Issue COVID-19 Cyber Threat Update

A growing number of cyber criminals and other malicious groups online are exploiting the COVID-19 outbreak for their own personal gain, security officials in the UK and USA have revealed.

A joint advisory published today (April 8, 2020) by the UK’s National Cyber Security Centre (NCSC) and US Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) shows that cyber criminals and advanced persistent threat (APT) groups are targeting individuals and organizations with a range of ransomware and malware.

Examples of scams include emails containing malware which appear to have come from the Director-General of the World Health Organization (WHO), and others which claim to offer thermometers and face masks to fight the pandemic.

Elsewhere the agencies have detected cyber criminals scanning for vulnerabilities in software and remote working tools as more people work from home during the pandemic.
As well as alerting people to the threat, the advisory directs them to the support available to counter it. This includes the NCSC’s guidance on dealing with suspicious emails and on working from home securely.

Paul Chichester, Director of Operations at the NCSC, said:
“Malicious cyber actors are adjusting their tactics to exploit the COVID-19 pandemic, and the NCSC is working round the clock with its partners to respond.
“Our advice to the public and organizations is to remain vigilant and follow our guidance, and to only use trusted sources of information on the virus such as UK Government, Public Health England or NHS websites.”

As the risk advisor for the USA, CISA is helping organizations take a comprehensive approach to maintain a heightened level of security. This includes a CISA Insights on risk management for Novel Coronavirus, as well as guidance for individuals and business on defending against COVID-19 scams and securing enterprise Virtual Private Networks.

Bryan Ware, CISA Assistant Director for Cybersecurity, said:
“As the COVID-19 outbreak continues to evolve, bad actors are using these difficult times to exploit and take advantage of the public and business. Our partnerships with the NCSC and industry have played a critical role in our ability to track these threats and respond.

“We urge everyone to remain vigilant to these threats, be on the lookout for suspicious emails and look to trusted sources for information and updates regarding COVID-19. We are all in this together and collectively we can help defend against these threats.”

To date the agencies are not seeing overall levels of cyber crime increase, but they are seeing a growing use of COVID-19 related themes by malicious cyber actors.
The techniques used by attackers prey on people’s appetite for information and curiosity towards the outbreak, with phishing emails and SMS messages using the virus as a lure to trick people into revealing credentials or downloading malicious software.

Phishing attempts often come from what appears to be a trustworthy sender, such as the ‘World Health Organization’, or with a subject line such as “2019-nCov: Coronavirus outbreak in your city (Emergency)”.

The NCSC and the CISA have also observed criminals scanning for known vulnerabilities in remote working tools and software, which is evidence that they are looking to take advantage of the increase in people working from home. This includes exploitation of the increased use of video conferencing software, such as Microsoft Teams, where phishing emails with attachment names such as ‘zoom-us-zoom_##########.exe’ and ‘microsoft-teams_V#mu#D_##########.exe’ aim to trick users into downloading malicious files.

It is expected that the frequency and severity of COVID-19 related cyber attacks will increase over the coming weeks and months.

You can read the full assessment here, which includes indicators of compromise (IOCs) for detection, and guidance for organizations and individuals on how to decrease the risk of cyber attacks.

Refer to trusted resources such as coronavirus.gov or the HHS website for official information about the coronavirus.

Additional Information
• APT groups conduct sophisticated attacks which typically aim to compromise an organization either through espionage or sabotage, but which aim to remain undetected for a long period of time.
• The Cybersecurity and Infrastructure Security Agency (CISA) is the nation’s risk advisor. We connect our partners in industry and government to improve the nation’s cyber and infrastructure security.
• Our mission is to lead the national effort to understand and advise on cyber and physical risks to our critical infrastructure.
• CISA’s goal is to be the “front door” to the government on issues related to cybersecurity and critical infrastructure protection.

Opening the doors to life or deadly covid-19 outcomes

By ISIO | International Security Industry Organization

Companies, sites and venues must re-budget and re-equip their premises that will host human traffic with the re-opening of the economies. The vulnerability landscape has changed dramatically where a company or site cannot afford to have an infected person in their location. Simply put, if such occurs, that company or site will be closed down again for weeks on end.

Doctors and nurses know what they are dealing with, but the security practitioner may not know. The opening of the doors to certain businesses or sites could draw desperate or mentally unwell people that could cause chaos. Larry Barton, Ph.D., Distinguished University Professor of Crisis Management and Public Safety, University of Central Florida, USA states ‘’action steps and considerations that employers must take now, before rancour and situations of aggression and harm emerge in the workplace.  While all of us want to be optimists, we must be realists- the health check of employees in so many employment environments globally does not meet a "one size fits all standard.

If, employers race to bring back employees without thinking about the many nuances that the ‘paper’ outlines, they do so at their own peril. The paper he refers to is, ‘’Managing covid-19, The Security Manager’s strategic, operational and protocol guide to limiting collateral damage’’

Different locations could be opened in a layered approach. Each location or field of interest could have the same issues of distinct problem that need to be overcome before mass traffic Subsequently, the protocols for the security and public must be in place.

Let us keep in mind that security officers perhaps already know that they have had a life impacting experience or died, but there are those that have no idea if they have had a near miss or perhaps could be infected. There is not much one could do if a person is not at full blown status with a high temperature which is a problem but what is just as big or perhaps a bigger problem is the person that has a high temperature. Furthermore, security officers could be highly trained with physical handling abilities, but they may not be appropriate for front line positions.

This situation dictates that the equipment, technology and manpower must work in sync. The vulnerability landscape demands that the right people with the appropriate skills must be placed in distinct positioning. The comprehension of incident reporting is vital so as to detect if there are issues that must be uncovered or copycat problems occurring that must be arrested.

The security industry can be the foundation sector that can dismantle covid-19 by advising their clients on the technology, equipment and manpower that is required. Furthermore, the certain protocols can be adopted to their sites or distinct and relevant protocols must be designed and implemented.

In this pandemic situation, security success to limit the collateral damage of covid-19 will depend on the level of situational awareness of the decision-makers on the ground (all are decision makers) and their reaction speed. Reaction speed at this moment – is simply – REACT NOW. The booklet referred to in this work can be found on ISIO  

CISA Releases Guidance on Essential Critical Infrastructure Workers During Covid-19

The Cybersecurity and Infrastructure Security Agency (CISA) released guidance to help state and local jurisdictions and the private sector identify and manage their essential workforce while responding to COVID-19.

As the Nation comes together to slow the spread of COVID-19, on March 16, the President issued updated Coronavirus Guidance for America. This guidance states that:

“If you work in a critical infrastructure industry, as defined by the Department of Homeland Security, such as healthcare services and pharmaceutical and food supply, you have a special responsibility to maintain your normal work schedule.”

CISA executes the Secretary of Homeland Security’s responsibilities as assigned under the Homeland Security Act of 2002 to provide strategic guidance, promote a national unity of effort, and coordinate the overall Federal effort to ensure the security and resilience of the Nation's critical infrastructure. The list of Essential Critical Infrastructure Workers was developed in coordination with Federal agencies and the private sector as a guide to help decision-makers within communities understand how to ensure continuity of essential functions and critical workforce as they consider COVID-related restrictions in certain communities (e.g., shelter-in-place). The list can also inform critical infrastructure community decision-making to determine the sectors, sub sectors, segments, or critical functions that should continue normal operations, appropriately modified to account for Centers for Disease Control (CDC) workforce and customer protection guidance. These critical functions include, but are not limited to, systems that support healthcare personnel (e.g., doctors, nurses, laboratory personnel, etc.), the food industry (e.g., retail groceries and pharmacies), communication providers (e.g., operator, call centers, IT data centers), defense systems support, law enforcement, public works, and other essential operations. Workers who support these critical functions are necessary to keep critical systems and assets working.

“As the nation comes together to slow the spread of COVID-19, everyone has a role to play in protecting public health and safety. Many of the men and women who work across our nation’s critical infrastructure industries are hard at work keeping the lights on, water flowing from the tap, groceries on the shelves, among other countless essential services,” said Christopher Krebs, CISA Director. “As the nation’s risk advisor, this list is meant to provide additional guidance to state and local partners, as well as industry, building on the President’s statement that critical infrastructure industries have a special responsibility to keep normal operations. We’re providing recommendations for these partners as they carry out their mission to keep their communities safe, healthy, and resilient. And on behalf of CISA, we thank the brave men and women who continue these essential jobs in challenging times.”

The list of Essential Critical Infrastructure Workers was developed using existing data and analysis, including publicly available analysis done by the President’s National Infrastructure Advisory Council in 2007. The list does not impose any mandates on state or local jurisdictions or private companies.

CISA will use this list to support federal, state, local, tribal, and territorial government response to COVID-19. To view the full list of Essential Critical Infrastructure Workers and to learn more about our efforts, visit www.cisa.gov/coronavirus.

Successful Critical Infrastructure Protection & Resilience Europe Delivers Great Discussions

Vice-Admiral Carlo Massagli, Italian Critical Infrastructures Secretariat - Presidency of the Council of Ministers and Roberto Baldoni, Deputy Director of the Department for Security Information (DIS), Italian Cybersecurity Agency contributed a great keynote to the excellent 3 days of discussions, with over 30 international expert speakers, on securing Europe's critical infrastructure in Milan.

The risk environment affecting critical infrastructure is both complex and uncertain. Threats, vulnerabilities and consequences have all evolved over a number of years and infrastructure that has long been subject to the dangers associated with physical threats and natural disasters are now increasingly exposed to cyber risks which stems from the growing integration of information and communications within their operations.

With changing dynamics so must our total approach to security and resilience. There is a continual need to review, develop and update policies, practices, procedures and technologies to meet those growing and changing demands.

The 3 day discussion addressed key issues from Regulations, Legislation & Standards to Resilience Strategies in CI and the Growth in Interoperability Between Critical Infrastructure Sectors and Enhancing Cross Industry Resilience.

The next CIPRE event will take place in Bucharest, Romania on 6th-8th October 2020. Further details at www.cipre-expo.com.

Critical Infrastructure Protection and Resilience North America opening keynote delivers highest profile messages

The opening of Critical Infrastructure Protection and Resilience North America in Tampa, Florida, supported by the International Association of CIP Professionals, enjoyed a fantastic keynote session - Brian Harrell Assistant Secretary for Infrastructure Protection, DHS setting out the priorities for CISA and highlighting the continued need to build partnerships. Dr. Daniel Kaniewski, Deputy Administrator Resilience, Federal Emergency Management Agency discussed the benefits of investing in up front mitigation measures stating that for every $1 invested in Federal Mitigation saves $6 in future disaster costs. Then Chauncia Willis Emergency Coordinator for Tampa delivered a powerful presentation on Diversity - Inclusion and Social Equity within CI Development.

Regional Director Bill Bailey to present at Asia Risk & Resilience

Dr Bill Bailey,  BA(Hons) MA, MCIL, PhD, Regional Director Australasia for the International Association of Critical Infrastructure Protection Processionals (IACIPP) and Adjunct Senior Lecturer, Edith Cowan University, Security Research Centre, Perth, Australia, will be presenting on 'PROTECTING CRITICAL INFASTRUCTURE: HOW TO USE A PROACTIVE SECURITY MANAGEMENT PROCESS TO ACHIEVE SUSTAINABLE RISK' at the 2019 Risk & Resilience Asia Conference in Singapore on 28th-30th August.

The protection of critical infrastructure assets is vital to every government, organisation, business and person. If the asset forms part of the essential critical infrastructure, then the loss can be catastrophic and far reaching with considerable national consequences. To avoid such damaging outcomes, requires a wide range of in-built security planning, structures, and operating procedures. A solution is to use a more adaptive, proactive, comprehensive security management process to: prevent, detect, deter, respond and defeat potential damaging events and incidents. Core to this security planning is a full understanding of the potential consequences of worst-case-scenarios as well as implementing a multi-layered intelligence gathering capabilities.  Adopting a process driven model is a more proactive approach and grounded upon current operational procedures used by major international companies in hostile and dangerous environments. By utilizing such a clearly defined comprehensive risk management tool, a more systematic security, threat, risk and vulnerability assessment (STRVA), process can be developed.

The Honorable Judge William H. Webster has been presented with Lifetime Achievement award by IACIPP

The Honorable Judge William H. Webster has been presented with Lifetime Achievement award by the International Association of Critical Infrastructure Protection Professionals (IACIPP)

The award recognises his incredible service, not only to his country but to the global security community. Chairman of the IACIPP, John Donlon QPM, said “There can be few more deserving candidates for this Award and it is our honour to recognise his achievements and service.”

The Award was presented on behalf of the IACIPP by Mr Jeff Gaynor, CIPRNA Conference Committee Member.

Judge Webster is a former Director of the Federal Bureau of Investigation, the Central Intelligence Agency and the United States Intelligence Community and Chairman, Homeland Security Advisory Council. He continues to serve America as the Chairman of the Homeland Security Advisory Council, U.S. Department of Homeland Security.

Judge Webster, proclaimed by Governor Tom Ridge the First Secretary of the U.S. Department of Homeland Security “A National Treasure,” was born on March 6, 1923, in St. Louis, Missouri. Judge Webster was awarded his Bachelor of Arts degree from Amherst College and received a Juris Doctor degree from Washington University in 1949. Judge Webster served as a United States Navy Lieutenant during World War II and the Korean War. A practicing attorney from 1949 to 1959, in 1960, Judge Webster became the United States Attorney for the Eastern District of Missouri and from 1964 to 1969 was a member of the Missouri Board of Law Examiners. In 1970 Judge Webster was elevated to the United States Court of Appeals for the Eighth Circuit.

In February 1978, Judge Webster was appointed by President Jimmy Carter as Director of the Federal Bureau of Investigation. Appointed by President Ronald Reagan, from May 1978 to August 1991 Judge Webster served as the Director of the Central Intelligence Agency and the Director, U.S. Intelligence Community. Judge Webster is the only person in U. S. History to serve in all three of these National Security positions. Upon his retirement from Federal service in 1991, Judge Webster practiced law in the Washington, DC offices of Milbank, Tweed, Hadley & McCloy, LLP. He has maintained an office there since his retirement.

In August 2005, Judge Webster was appointed by President George W. Bush as Chairman of the Homeland Security Advisory Council (HSAC). With the cascading consequences of the long-anticipated failure of the New Orleans Levee System still being inflicted, Judge Webster spearheaded an HSAC study into the adequacy of U.S. Critical Infrastructure Protection policies and programs. In January 2006, the HSAC’s “Report of the Critical Infrastructure Task Force” made public its principal recommendation: “Promulgate Critical Infrastructure Resilience as the top-level strategic objective — the desired outcome to drive national policy and planning.” The HSAC’s subsequent June 2011 “Community Resilience Task Force Recommendations” provided the vision and means to operationalize resilience in communities throughout America.

Judge Webster holds 18 honorary degrees and Doctorates and in further recognition of his singularly unique service to the Nation and among his many awards, Judge Webster is the recipient of the Presidential Medal of Freedom; the Distinguished Intelligence Medal; and the National Security Medal. In August 2017, the National Spy Museum presented to Former President George H. W. Bush The Honorable William H. Webster Distinguished Service Award.

Judge Webster was married to the late Drusilla Lane Webster for 34 years and is the father of three children. In 1990, Judge Webster married Lynda Clugston. Residing in the Washington, DC area, they enjoy seven grandchildren, a golden retriever, a tabby cat and three horses.

IACIPP Participate in NATO supported Workshop

With respect to the significance of cyber defence of energy sector, with the support of NATO Science for Peace and Security Program, a five-day course was conducted in Ukraine under the hosting of the Ukrainian institute of Center for Security and Defence Studies (CSDS) with the partnership of the Institute for Security and Safety, Brandenburg University of Applied Sciences based in Germany. As being a part of the organizational committee, IACIPP also supported the event.

The Association's Caspian and MENA Region Director, Ayhan Gücüyener, participated the event as a lecturer and present on the "Cyber Defence in the Energy Security Context: Understanding the Vulnerabilities, Taking the Actions".

In a modern World of rapid technological changes it is an existential matter for every nation to strengthen its cyber defence. In addition, in case of a broad and sophisticated cyber attack targeting our vital critical infrastructures, the result would be catastrophic. In a rapidly digitalized world our telecommunication networks, water systems and energy infrastructures are becoming more and more vulnerable to cyber threats. However, among those, energy infrastructures are the most favourite target for hackers who know well that a big black out could cause a massive chaos and create a significant economic damage.

As a result, cyber vulnerabilities of energy infrastructures emerges as a crucial topic. The high significance of cyber defence for energy security is caused by twofold reasons. On the one hand, there is strong dependence of economy and society from energy sector. On another hand, there is an increasing trend of sophisticated cyber-attacks directed on energy companies and particular facilities all around the globe. Therefore, cyber security should be precisely considered beside physical protection that was dominated in last century, and comprehensive approach of cyber-physical protection should be implemented on critical infrastructure facilities.

IACIPP responds to UN Security Council call to protect ‘critical infrastructure’ from terrorist attacks

Earlier this month the UN Security Council urged joint measures to protect ‘critical infrastructure’ from terrorist attacks

Given the importance of critical infrastructure for a country’s prosperity and security and against the backdrop of increasingly diverse physical and cyber threats from terrorist groups, the United Nations Security Council underlined the need for international collaboration – both domestically and across borders – to ensure their protection.

In a resolution adopted unanimously the 15-member Security Council reiterated “the need to strengthen efforts to improve security and protection of particularly vulnerable targets, such as infrastructure and public places.”

Attacks against objects and sectors such as banking and finance, telecommunications, emergency services, air, maritime and rail transportation, and energy and water supply – perceived as ‘attractive targets’ for terrorist groups – can result not only in civilian casualties, but also damage property on a large scale, disrupt proper functioning of public services, and create chaos in societies.

It called upon UN Member States “to share information […] to prevent, protect, mitigate, investigate, respond to and recover from damage from terrorist attacks on critical infrastructure facilities, including through joint training, and use or establishment of relevant communication or emergency warning networks.”

In response to this call to action the International Association of Critical Infrastructure Protection Professionals (IACIPP) has today announced the launch of the www.IACIPP.net a global extranet designed for critical infrastructure professionals to share information with other members, keep up-to-date with the latest threats, best practise, training opportunities and much more.

Chairman of the IACIPP John Donlon QPM, FSI said “We fully endorse the UN resolution and we have already been working hard to do our part to make that aspiration a reality. The extranet is now live and operational for members. The association is open to all CIP professionals including operator site managers, security officers as well as first responders, government agency officials, officers and policy makers. Membership of the association is still free and we encourage colleagues around the world to join us.”

He went on to say: “We look forward to welcoming new members and will be demonstrating the www.IACIPP.net platform for the first time at the Critical Infrastructure Protection and Resilience, Europe conference and expo in The Hague from the 9th to 11th May 2017, where CIP professionals from across Europe and beyond will gather once again to discuss the burning issues.”

1 51 52 53 54