Story image

Expert says Germany’s ‘hack back’ proposal is a slippery slope

09 Oct 2017

Late last week German intelligence officials urged lawmakers to grant them more legal authority to ‘hack back’ in the event of international cyberattacks.

This comes in the wake of various attacks, including the May 2015 hacking of the German lower house of parliament, the Bundestag, which German officials blamed on APT28, a Russian hacker group that is said to have ties to Moscow.

Head of the BfV domestic intelligence agency, Hans-Georg Massen proclaimed to the parliamentary oversight committee that they should be legally equipped to destroy data that is stolen from German servers and moved to foreign servers – thus preventing cybercriminals and foreign powers from misusing it.

In a similar way to which human agents are used for counter-espionage, Massen argued it would be logical to ‘infect’ foreign servers with software that would then provide for improved visibility and surveillance of any malicious operations targeted against German cyber targets.

“In the real world, it would be like turning a foreign intelligence agent and getting them to work for us ... Something like this should be possible in the cyber world too,” Maassen told the committee in its first public hearing.

“These are ‘hack back’ instruments, but they are below the threshold of destroying or incapacitating a foreign server,” Maassen said.

CEO of web security company High-Tech Bridge, Ilia Kolochenko says while at first glance a hack back concept sounds fair and reasonable, he believes it may be a slippery slope as in the digital world the counterattack principle may be very different from its common notion.

“On the Dark Web, one can easily purchase access to hacked systems of governments, law enforcement agencies and police. Cybercriminals and nation-state actors may just buy compromised systems of their rivals and frame up them,” says Kolochenko.

“Afterwards, genuine attackers will use an alleged breach as an excuse for well-prepared attacks on their victims. Legal questions intertwined with the hack back are much less complicated compared to practical problems we may face.”

Kolochenko asserts the solution needs to be approached with care.

“Therefore, we should rigorously conceptualise and analyse the hack back principle with the game theory in mind. Otherwise, we will unavoidably create a parade of horrors detrimental for all civilized states."

Germany’s BND chief, Bruno Kahl told the committee that its foreign intelligence agency already has the expertise to destroy foreign servers, but lacks the legal authority.

However, Kahl says at the end of the day, such decisions have to be made by politicians.

Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.