The World Cup wrapped up last week, drawing to a close
both global attention and cybercrime activity associated with the
international soccer tournament. Though protests via DDoS attacks and
data breaches certainly plagued the event, it was carried off without
major hitches. As the World Cup winds down and Brazil prepares for its
Olympics, the eyes of sports fans and cybersecurity experts alike turn
to another upcoming international sporting event, the 2020 Olympic Games
to be held in Tokyo.
Japan, known for being ahead of the technological curve, is already in the throes of preparation for the prestigious event. Despite its technological expertise, Japan is not necessarily on the cutting edge of cybersecurity. A recent flurry of incidents in Japan have shown this -- from the circulation of banking malware to open statements by the Government. Will Japan be prepared for the cybersecurity risks that come along with large international events like the Olympics?
Japan Hit Hard in 2014
So far this year, Japan has seen quite a few cyber-attacks. The banking sector in particular has suffered at the hands of a financial malware that circulated the country. The malware family VAWTRAK, which took advantage of a Microsoft vulnerability to block anti-virus software, spread across Japan earlier this year.
Between that malware, ZeuS, and others, huge financial losses were reported in Japan. The Japanese National Police Agency reported 1.417 billion yen were stolen via financial malware between January and May this year. That is more than was lost in the whole of 2013.
Similarly, The Japanese Bankers Association reported 21 individual cases of banking malware in the first quarter of 2014. There were a total of 14 in 2013. Trend Micro Labs reported that Japan was the second most affected by financial malware in the first quarter of 2014, surpassed only by the US.
Another malware was recently discovered in some of Japan’s most popular pornographic websites. The malware exploits a Java vulnerability in order to steal personal and banking information. A variety of this malware has also been adapted for form-grabbing, which allows hackers access to all data entered into forms on infected computers. This malware has been discovered on 87 websites thus far.
Mt. Gox Fiasco
Amid the banking malware came the collapse of Mt. Gox, one of the most important Bitcoin trading platforms, which was based in Japan. Mt. Gox announced its bankruptcy after it had lost over half a billion dollars worth of Bitcoins due to hacking.
This has led the Japanese government to consider regulation of the crypto-currency, considering the huge financial loss caused by the bankruptcy of Mt. Gox. In an attempt to save Bitcoin in Japan, a sino-american partnership is hoping to buy up what is left of Mt. Gox. Regardless, the damage is done, and the money lost.
Preparation for 2020
Cognisant of the impending cybercrime influx, Tokyo is already preparing cybersecurity for the Olympic Games. It has been reported that the London Olympics website was attacked over 200 million times. The Japanese government has already made moves to improve its cybersecurity. A cybersecurity policy council is to be set up next year in the lead-up to the games.
Japanese government officials have admitted that Japan lacks in the domain of cybersecurity. However, concrete preparations have already begun. In March of this year, the Japanese government held a cybersecurity drill in many of its agencies. White-hat hackers were hired to attempt to penetrate the government’s networks.
The responsibility of cybersecurity is held by four agencies, including the National Police Agency. Tokyo has also stated it will increase cooperation and coordination between these agencies in order to improve security over-all.
In May, Japanese Prime Minister Shinzo Abe met with EU leaders to discuss a potential cybersecurity partnership, among other things. Dialogue between the two would certainly aid Japan in preparation for the Olympics. An agreement was reached, aiming to facilitate exchange of expertise and knowledge of cybersecurity practices.
Private Efforts
As previously noted by HackSurfer, DDoS (Distributed Denial of Service) attacks are the primary problems with which international sporting events must struggle. HackSurfer had the opportunity to speak with one of the largest Japanese ISPs, Sakura Internet, which has developed a way of dealing with such attacks quickly and effectively.
They are using big data in order to filter out malicious traffic in real time. Their servers send sample traffic to their databases, which profiles the traffic and is able to distinguish the malicious from the legitimate. They are essentially able to stop many DDoS attacks in their tracks. In April of this year, they were able to mitigate 40 of 60 attacks, quickly restoring service to the victims.
DDoS attacks are frequently able to overwhelm servers before they are recognized as attacks. According to Tamihiro Yuzawa, network engineer at Sakura Internet, “In most cases, it takes less than 10 seconds for the attack traffic to grow over gigabits per second.” This solution is often able to neutralize a DDoS attack before it reaches such volumes. Some attacks have been stopped within 20 seconds.
Looking to 2020
Solutions like those developed by Sakura as well as other private sector efforts are certain to be in high demand when the Olympics finally make their way to Tokyo. It is clear Japan has a long way to go before it is ready to face the cybersecurity challenges of The Olympic Games. Its financial sector has been a major victim this year, and cybercrime is on the rise.
However, with six years to prepare, Japan has time to beef up security. With preparations already in full swing and a blossoming cybersecurity partnership with the EU, hopefully Japan will be up to the challenge.
Japan, known for being ahead of the technological curve, is already in the throes of preparation for the prestigious event. Despite its technological expertise, Japan is not necessarily on the cutting edge of cybersecurity. A recent flurry of incidents in Japan have shown this -- from the circulation of banking malware to open statements by the Government. Will Japan be prepared for the cybersecurity risks that come along with large international events like the Olympics?
Japan Hit Hard in 2014
So far this year, Japan has seen quite a few cyber-attacks. The banking sector in particular has suffered at the hands of a financial malware that circulated the country. The malware family VAWTRAK, which took advantage of a Microsoft vulnerability to block anti-virus software, spread across Japan earlier this year.
Between that malware, ZeuS, and others, huge financial losses were reported in Japan. The Japanese National Police Agency reported 1.417 billion yen were stolen via financial malware between January and May this year. That is more than was lost in the whole of 2013.
Similarly, The Japanese Bankers Association reported 21 individual cases of banking malware in the first quarter of 2014. There were a total of 14 in 2013. Trend Micro Labs reported that Japan was the second most affected by financial malware in the first quarter of 2014, surpassed only by the US.
Another malware was recently discovered in some of Japan’s most popular pornographic websites. The malware exploits a Java vulnerability in order to steal personal and banking information. A variety of this malware has also been adapted for form-grabbing, which allows hackers access to all data entered into forms on infected computers. This malware has been discovered on 87 websites thus far.
Mt. Gox Fiasco
Amid the banking malware came the collapse of Mt. Gox, one of the most important Bitcoin trading platforms, which was based in Japan. Mt. Gox announced its bankruptcy after it had lost over half a billion dollars worth of Bitcoins due to hacking.
This has led the Japanese government to consider regulation of the crypto-currency, considering the huge financial loss caused by the bankruptcy of Mt. Gox. In an attempt to save Bitcoin in Japan, a sino-american partnership is hoping to buy up what is left of Mt. Gox. Regardless, the damage is done, and the money lost.
Preparation for 2020
Cognisant of the impending cybercrime influx, Tokyo is already preparing cybersecurity for the Olympic Games. It has been reported that the London Olympics website was attacked over 200 million times. The Japanese government has already made moves to improve its cybersecurity. A cybersecurity policy council is to be set up next year in the lead-up to the games.
Japanese government officials have admitted that Japan lacks in the domain of cybersecurity. However, concrete preparations have already begun. In March of this year, the Japanese government held a cybersecurity drill in many of its agencies. White-hat hackers were hired to attempt to penetrate the government’s networks.
The responsibility of cybersecurity is held by four agencies, including the National Police Agency. Tokyo has also stated it will increase cooperation and coordination between these agencies in order to improve security over-all.
In May, Japanese Prime Minister Shinzo Abe met with EU leaders to discuss a potential cybersecurity partnership, among other things. Dialogue between the two would certainly aid Japan in preparation for the Olympics. An agreement was reached, aiming to facilitate exchange of expertise and knowledge of cybersecurity practices.
Private Efforts
As previously noted by HackSurfer, DDoS (Distributed Denial of Service) attacks are the primary problems with which international sporting events must struggle. HackSurfer had the opportunity to speak with one of the largest Japanese ISPs, Sakura Internet, which has developed a way of dealing with such attacks quickly and effectively.
They are using big data in order to filter out malicious traffic in real time. Their servers send sample traffic to their databases, which profiles the traffic and is able to distinguish the malicious from the legitimate. They are essentially able to stop many DDoS attacks in their tracks. In April of this year, they were able to mitigate 40 of 60 attacks, quickly restoring service to the victims.
DDoS attacks are frequently able to overwhelm servers before they are recognized as attacks. According to Tamihiro Yuzawa, network engineer at Sakura Internet, “In most cases, it takes less than 10 seconds for the attack traffic to grow over gigabits per second.” This solution is often able to neutralize a DDoS attack before it reaches such volumes. Some attacks have been stopped within 20 seconds.
Looking to 2020
Solutions like those developed by Sakura as well as other private sector efforts are certain to be in high demand when the Olympics finally make their way to Tokyo. It is clear Japan has a long way to go before it is ready to face the cybersecurity challenges of The Olympic Games. Its financial sector has been a major victim this year, and cybercrime is on the rise.
However, with six years to prepare, Japan has time to beef up security. With preparations already in full swing and a blossoming cybersecurity partnership with the EU, hopefully Japan will be up to the challenge.
No comments:
Post a Comment