Offbeat

Columnists

A Code War has replaced The Cold War. And right now we’re losing it

There’s always someone to blame for bad infosec, but never a willingness to make meaningful change


Column Remember the Cold War? For me, growing up in America meant living under the permanent, intangible threat of sudden vaporisation by thermonuclear attack. It added a piquant pointlessness to everything. Ashes, ashes, all burn down.

Yet the world stubbornly refused to end. Communism collapsed, Western neoliberal democracy seemed triumphant.

Then just as we entered a phase of peace and prosperity, the internet came along and ruined everything.

It took some time; Rome was not destroyed in a day. And we should have seen it coming. A full year before the Berlin Wall came down, the Morris Internet Worm took the then-tiny internet down with an exploit drawn from weaknesses in sendmail, finger and remote shell. In 1989, Robert Tappan Morris was arrested and prosecuted under the then brand-new Computer Fraud and Abuse Act.

I’m increasingly of the belief that instead we should have given him the Presidential Medal of Freedom.

How do we combat mass global misinformation? How about making the internet a little harder to use

READ MORE

Morris showed us the weaknesses of connected systems, demonstrating in code that every connection represents an attack surface. At a moment time when those connections began multiplying exponentially - from hardly any to almost everything - we could have heeded the message instead of shooting the messenger.

Flash forward thirty-two years and we can see that the landscape we inhabit today could have been predicted. And that means it could have been avoided.

Instead, we see the SolarWinds hack, described as a “digital Pearl Harbor”, so extensive is its scope. And the hits keep on coming, from odd malware worming its way into tens of thousands of macOS systems, to motherboards that allegedly record and transmit data back to servers in China, and even corrupted dependencies in the software stacks used by - well, pretty much everyone, everywhere.

Connections can be powerful, but with great power... you know the rest.

So who’s responsible? We try to blame users, or lazy manufacturers, or obscure procedures or “bad actors” (which, depending on the paranoia of the day, can range from Russia to cryptocurrency-fueled ransomware dealers.) There’s always someone to blame, shifting responsibility for the failure carefully away from anyone who otherwise might be forced to change what they’re doing.

If this goes on, the scope for networked collaboration will continue to dwindle, until it disappears completely behind walls of denial and compromised infrastructure. This problem is not moving toward a solution. It’s not even in some sort of status quo. It’s getting worse. Rapidly.

It’s long past time we faced that ugly truth. And took responsibility.

That means putting an abrupt pause to software and hardware systems development as they’ve been practiced for the past 30 years. Throwing out the practices that landed us here and acknowledging the real message of the Morris Internet Worm: the Cold War ended, but the Code Wars began.

That time when an NSA bloke's son borked the ENTIRE INTERNET...

READ MORE

Like the Cold War, the Code Wars won’t have much of a body count and might never flare into outright violence. But when we peel back the cool surfaces, we witness the same titanic battles for power and control, this time using cyberspace as a platform for dominance - just as, militarised by ICBMs, outer space became the premier platform for dominance in the Cold War.

Space may also point the way toward a solution. Reagan’s largely fanciful "Star Wars" program accelerated the Soviet Union’s slide into economic and military collapse. It may be possible that a similar approach - using "moonshot" technologies like artificial general intelligence and high qubit quantum computing - could place the defenders so far ahead of the attackers that assault becomes effectively impossible, or makes continuing combat ruinously expensive. Although far from guaranteed, we could put an end to the Code Wars by changing the game.

Is that sort of doubling down on computing exactly the wrong approach? Whatever we do, we can’t keep doing what we’re doing. Denial has stopped working. Either we lose the game – or we change it. ®

Send us news
85 Comments

IcedID henchman gets nine years in clanger for abusing malware to drain bank accounts

The slippery Ukrainian national must also pay a hefty $74 million on top of the jail time

Houthi rebels are operating their own GuardZoo spyware

Fairly 'low budget', unsophisticated malware, say researchers, but it can collect the same data as Pegasus

China's APT41 crew adds a stealthy malware loader and fresh backdoor to its toolbox

Meet DodgeBox, son of StealthVector

ViperSoftX variant spotted abusing .NET runtime to disguise data theft

Freeware AutoIt also used to hide entire PowerShell environments in scripts

Malware that is 'not ransomware' wormed its way through Fujitsu Japan's systems

Company says data exfiltration was extremely difficult to detect

Baddies hijack Korean ERP vendor's update systems to spew malware

Notorious 'Andariel' crew takes a bite of HotCroissant backdoor for fresh attack

Not-so-OpenAI allegedly never bothered to report 2023 data breach

Also: F1 authority breached; Prudential victim count skyrockets; a new ransomware actor appears; and more

Europol nukes nearly 600 IP addresses in Cobalt Strike crackdown

Private sector helped out with week-long operation – but didn't touch China

Three words to send a chill down your spine: Snowflake. Intrusion. Alert

And can AI save us from the scourge of malware? In theory, why not, but in practice ... Color us skeptical

Avast secretly gave DoNex ransomware decryptors to victims before crims vanished

Good riddance to another pesky tribe of miscreants

Korean telco allegedly infected its P2P users with malware

KT may have had an entire team dedicated to infecting its own customers

Microsoft tells yet more customers their emails have been stolen

Plus: US auto dealers still offline; Conti coders sanction; Rabbit R1 hardcoded API keys; and more