Theft & Subsequent Re-Use of Cyber Weapons

Almost exactly one year ago, the world experienced two destructive cyber-attacks in which offensive cyber tools developed by the National Security Agency were stolen and shared with the public. 

In May 2017, the WannaCry ransom-ware hit over 300,000 computers in 150 countries. One month later, the NotPetya attack hit the computer systems of companies and governmental entities across the globe causing millions of dollars in damages. 

These attacks exploited numerous vulnerabilities, and have subsequently exposed the slow response time of targeted countries and the lack of effective information sharing mechanisms between responsible agencies, something which could have mitigated the severe damage caused by the attacks.

The interesting feature of these attacks is that those responsible, North Korea and Russia, used the leaked offensive tools originally developed by the NSA. 

The investigation into WannaCry ultimately revealed that the attackers had exploited a security vulnerability called EternalBlue, originally developed by the NSA. NotPetya used a variant of the same vulnerability, which is still wreaking havoc a year later. For example, in February 2018, security researchers at Symantec reported that an Iran-based hacking group had used EternalBlue as part of its operations.

This situation whereby technologically advanced countries are investing efforts in developing offensive cyber capabilities only to have these very tools stolen and reused raises three critical questions of urgent policy relevance.

First, are states going to start reusing each other’s leaked cyber tools as a matter of course? The ability to reuse stolen cyber tools may signal the beginning of a shift in the distribution of international cyber power, as weaker actors (including non-state actors) become increasingly able to use sophisticated malware to cause global damage and possibly target the cyber weapons’ original designers. 

Countries that are less technologically advanced and less vulnerable to cyberattacks might find the reuse of stolen vulnerabilities appealing for their own offensive activity.

Second, is it possible to prevent the leaking of cyber tools from occurring in the first place? There aren’t many reasons to be optimistic. Firstly , there’s the insider threat problem, a particularly thorny issue given the extensive use of contractors and the risk that they steal or mishandle sensitive information that they were exposed to during their service. A second and possibly more problematic reason is that it is cheaper to use stolen vulnerabilities than finding new ones. As new vulnerabilities like EternalBlue get exposed, the costs of using stolen cyber vulnerabilities and conducting attacks are being consistently lowered while benefits remain high. 

States with offensive capabilities know that putting their hands on unique vulnerabilities developed by their adversaries will enable them to more easily launch sophisticated attacks without the need pursue a lengthy and costly R&D process. 
This makes the reuse of cyber tools especially appealing and may motivate different actors to concentrate their efforts in this direction. As long as the benefits of using the stolen vulnerabilities are higher than the costs, these vulnerabilities will remain an attractive target.

A third question for policymakers is whether the theft and reuse of cyber vulnerabilities change the way states handle these vulnerabilities. States should be aware of the risk that vulnerabilities leak into the open and develop information-sharing mechanisms to address it. These information sharing mechanisms should exist between the intelligence agencies themselves and between the intelligence community and the tech industry. 

Once it has been recognised that a vulnerability, exploit or tool has been stolen, the relevant agency should immediately share the specific data with all the agencies and firms that might get affected by it, just like what the NSA is believed to have done. 
To minimise security concerns and to not expose sensitive sources and methods, there is no need to share the precise reasons for giving such warnings. Yet it is crucial to share this information in order to patch the vulnerabilities as soon as possible and lower future risks.

The US government has its own vulnerabilities equities process (VEP) policy which sets out how the US government discloses computer vulnerabilities it detects or acquires to other vendors. Countries across Europe have their own similar VEP mechanism, and an EU-wide VEP is being considered. 

But as so many countries around the globe are developing offensive cyber capabilities, and in light global damage costs of the WannaCry and NotPetya, there is an urgent need to create an international mechanism for vulnerability disclosures akin to a global VEP.

Formulating an effective response to this growing type of cyber weapon proliferation is clearly the responsibility of national governments. 

Alongside the development of these offensive capabilities, and in light of the success of recent attacks, the theft and leak of offensive cyber weapons and their subsequent use is only likely to increase, potentially creating new international tensions between governments and between them and the tech industry.

Defense One:

You Might Also Read: 

Prices For Stolen NSA Exploits Go Higher:

When Terrorists Learn How to Hack:
 

« Using AI To Reduce Business Risks
China Escalates Hacks On The US »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

Security Weekly

Security Weekly

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research.

Verimatrix

Verimatrix

Verimatrix is a global provider of innovative cybersecurity solutions that protect content, devices, software and applications.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

Exein

Exein

Exein are on a mission to build the world’s first ecosystem for firmware security so that all different types of firmware are secure around the world.

Conviso

Conviso

Conviso is a consulting company specialized in Application Security and Security Research.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jobsora

Jobsora

Jobsora is an innovative job search platform in the UK and more than 35 other countries around the world. Sectors covered include IT and cybersecurity.

Amadeus Capital Partners

Amadeus Capital Partners

Amadeus Capital Partners offers over 20 years’ experience in technology investment. Our areas of focus include AI & machine learning and cyber security.

Crosspring

Crosspring

Crosspring is an incubator/accelerator for people who have the ambition to start a successful business or want to extend their existing business in the areas of FinTech, AR, VR, Cybersecurity and SaaS

Cyber7

Cyber7

CYBER7 is a National Cyber Security Innovation community initiated by Israel National Cyber Directorate, Ministry of Economy and Israel Innovation Authority led by Tech7 – Venture Studio.

Binarly

Binarly

Binarly has developed an AI-powered platform to protect devices against emerging firmware threats.

Information Systems Security Association (ISSA)

Information Systems Security Association (ISSA)

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Arsen Cybersecurity

Arsen Cybersecurity

Arsen is a French cybersecurity startup, dedicated to enhancing human behaviors in cybersecurity.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.

Hack-X Security

Hack-X Security

Hack-X Security provide IT risk assessment and Digital Security Services. We are a trusted standard for businesses that must protect their data from cyber-attacks.