In a glance.
- The TLDR Bill will enforce the Feed Label terms of service.
- The FBI is changing the Internet’s priorities.
- Government Accountability Office reports on SolarWinds exploit detection and response.
- FSB eliminates REvil.
- Reaction to the Federal Communications Commission’s proposed disclosure rules.
Too long, you no longer need to read.
A bipartisan group of US Congressmen has drafted a bill aimed at making it easier for users to understand what they are obligated to do when they check the small “Agree to Terms of Service” box on a website. The Washington Post explains that the cleverly named TLDR will require the usually boring jargon to be accompanied by a short-form statement designed to prevent companies from taking advantage of users’ unwillingness to read overly complex text.
In addition to communicating the data the site collects, the summary also informs users if the site has recently experienced any data breaches. Louisiana Senator Bill Cassidy, a supporter of the measure, stated that “requiring companies to provide an easy-to-understand summary of their terms should be mandatory and is long overdue.” The action will be enforced by the Federal Trade Commission and state attorneys general, and companies found in violation could face a civil lawsuit.
The FBI is signaling a shift in cybersecurity priorities.
The US Federal Bureau of Investigation (FBI) is signaling a shift in their approach to tackling cybercrime, CyberScoop reports. Speaking at a Silverado Policy Accelerator event, FBI Internet Division Assistant Director Brian Forendran indicated that the bureau would place less emphasis on indictments. “The FBI specifically is moving away from the indictment and arrest first model to the totality of imposing costs on our opponents, and we’re making tremendous progress there,” he said. Tonya Ogoritz, deputy assistant director of the Internet division, explained that the FBI will focus more on ransom payments seizures, as they did during last year’s attack on the Colonial pipeline. “The kinds of ransomware operations that we saw doing with the Department of Justice last year are definitely things that we want to replicate…and try to scale up,” Ogoritz stated.
However, some experts are concerned about such tactics. “Anti-ransomware approaches that may have a greater impact on the criminal system include cracking down on cryptocurrency transactions, making ransom payments illegal, and making covering such payments illegal for companies,” says Josephine Wolf, professor of cybersecurity policy at Tufts University. insurance., and imposing security requirements on critical infrastructure operators to reduce the possibility of infection in the first place.”
GAO reports on Solar Winds and Microsoft Exchange attacks.
The US Government Accountability Office (GAO) has released a report summarizing the federal response to two major cybersecurity incidents, the 2020 SolarWinds cyber attack, as well as the recent exploitation of vulnerabilities in the Microsoft Exchange server. FedScoop notes that the report highlights communication difficulties between the public and private sectors, as well as between government agencies. “Specifically, an official from ODNI’s Electronic Executive Office told us that sharing information between law enforcement, the private sector, and intelligence groups was difficult and time-consuming, as there were different levels of information classification,” the report states.
In response to these findings, the Government Accountability Office is calling for the creation of a central forum to support interagency communications as well as correspondence between government and industry. The report also details the creation of a Unified Coordinating Group (UCG) made up of the Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation, and the Office of the Director of National Intelligence, with assistance from the National Security Agency. A SolarWinds spokesperson told Fox Business that the report “highlights the importance of improving public-private partnerships, and that coordination and information sharing should be a two-way street between government and the private sector.”
FSB takes down REvil.
Russia’s Interfax news agency reported this morning that the FSB has liquidated the gang in a series of arrests. “The Russian Federal Security Service created the entire composition of the REvil criminal community, its members were involved in the illegal circulation of payment means, and illegal activities were documented,” an official statement read. The FSB said it carried out the raids (which resulted in not only fourteen arrests, but $600,000 and €500,000 in cash, plus computers, “cryptocurrency wallets used to commit crimes,” and twenty luxury cars, all reportedly illegally) when “ Appeal to the relevant US authorities.
The arrests should be noted in that the Russian ransomware gangs effectively acted as hackers, allowed to steal from selected foreign targets insofar as this theft serves the interests of the state. But REvil apparently lost the letter of the mark and revenge. Ziv Mador, Vice President of Security Research, Trustwave SpiderLabs described the Russian action as “unprecedented”:
“This unprecedented action from the Russian Federal Security Service (FSB) is in line with the fear we observed while conducting a survey of cybercriminal conversations on the dark web. Cybercriminals on the dark web indicated back in November 2021 that they believed there were negotiations Secrecy on cybercrime between the Russian Federation and the United States urging each other to prepare for potentially dangerous actions from Russia. Time will tell if REvil’s resources will reappear in another form, as we have seen with other ransomware groups many times in the past.”
Reaction to proposed disclosure rules from the US Federal Communications Commission (FCC).
Trevor Morgan, product manager at Comforte AG, believes the rules will place much of their burden on federal agencies:
“The FCC’s suggestion that data breach reporting rules should be stricter on carriers reflects the pressure on government agencies to take better proactive action on cybersecurity.
“Last year’s high profile abuses affecting many supply chains and even large ICT organisations, many of which had a ripple effect on the average consumer, have certainly caught the attention of governments and regulators around the world.
“Carriers collect a huge amount of information about their customers, much of it made up of highly private and sensitive data, so ensuring that these companies respond responsibly and quickly to any data breach – intentional breach or unintentional data leak – helps create the best data privacy and security culture, It accidentally boosts public confidence.
“Another mitigating approach for businesses in telecommunications or any other industry is to adopt data-centric security, which applies strong cryptographic or format-preserving protection directly to sensitive data, making it unreadable and therefore unusable by industry actors. Threat area. Reporting a breach occurred but no sensitive data was detected, this is a much better call than the alternative, with much better reception.”