Supreme Court’s overruling of Chevron deference alters cybersecurity agenda in the US

The recent decision by the US Supreme Court to overturn the long-standing ‘Chevron deference’ doctrine will have significant implications for the Biden administration’s cybersecurity agenda, particularly regarding the protection of critical infrastructure. The ruling shifts the power to interpret and enforce laws related to cybersecurity from executive agencies to Congress and the courts, marking a departure from the previous approach that relied on agency-led initiatives to enhance cybersecurity practices.

One key takeaway from this development is how it has revealed the inadequacies in the cybersecurity practices of critical infrastructure organisations. Despite the rise in cyber threats targeting these entities, many have failed to implement baseline security measures like multifactor authentication, making them vulnerable to attacks. The absence of stringent regulations mandating such practices has exacerbated these organisations’ cybersecurity challenges.

The Biden administration’s strategy of leveraging existing agency rules to bolster cybersecurity measures is now facing a regulatory overhaul. The government must implement a more comprehensive legislative approach to address cybersecurity gaps.

Looking ahead, the repeal of the Chevron deference doctrine is set to usher in a new era of cybersecurity regulation, with a stronger emphasis on congressional involvement in shaping cybersecurity policies. The increased engagement of legislative affairs staffers, lobbyists, and advocates in the regulatory process shows a shift towards a more collaborative and evidence-based approach to cybersecurity governance.

Why does it matter?

As the landscape of cybersecurity regulation evolves in response to this landmark decision, critical infrastructure sectors are expected to face renewed scrutiny regarding their cybersecurity preparedness. The need for robust cybersecurity frameworks and proactive measures to safeguard vital infrastructure assets has never been more pressing. Therefore, the implementation of comprehensive and effective cybersecurity regulations is becoming imperative.

Phishing attack compromises Formula 1 governing body email accounts

The Fédération Internationale de l’Automobile (FIA), the governing body of auto racing since the 1950s, revealed that attackers managed to access personal data by compromising several FIA email accounts through a phishing attack. Established in 1904 as the Association Internationale des Automobile Clubs Reconnus (AIACR), the FIA is a non-profit international association that oversees various auto racing championships, including Formula 1 and the World Rally Championship (WRC). With 242 member organisations spanning 147 countries across five continents, the FIA also governs the FIA Foundation, which supports and finances road safety research.

In response to the breach, the organisation swiftly took corrective actions, including promptly blocking the unauthorised accesses upon discovery of the incidents. The FIA informed the Swiss data protection regulator (Préposé Fédéral à la Protection des Données et à la Transparence) and the French data protection regulator (Commission Nationale de l’Informatique et des Libertés) about the security breach.

To prevent similar incidents in the future, the FIA implemented enhanced security measures and expressed regret for any concerns raised among the affected individuals. Emphasising its commitment to data protection and information security, the FIA continuously evaluates and strengthens its systems to combat evolving cyber threats. However, details such as the breach detection timeline, the extent of personal information accessed, and the nature of the exposed or stolen sensitive data remain undisclosed by the organisation.

Australia moves top secret data to Amazon cloud

Australia is set to transfer its top-secret intelligence data to the cloud under a $2 billion agreement with Amazon Web Services to enhance defence interoperability with the United States. Defence Minister Richard Marles emphasised that the move to distributed, purpose-built facilities would bolster the resilience of data crucial for the defence force, ensuring continued operation even if individual servers fail.

The Director General of the Australian Signals Directorate, Rachel Noble, highlighted that the shift will also incorporate increased use of AI to analyse data. Noble stressed the importance of using AI ethically and with careful governance to understand its impact on data and its applications within the intelligence community.

Marles noted the significance of maintaining a common computing environment with US defence forces, especially as modern warfare increasingly relies on top-secret data, such as that used by F-35A joint strike fighter aircraft. He explained that data from sensors feeding into these platforms is vital for targeting, defence, and protection of other assets.

Prime Minister of Australia, Anthony Albanese, announced that the partnership with Amazon Web Services would enhance national security capabilities and create 2,000 local jobs. Director-General of National Intelligence Andrew Shearer reiterated that interoperability with security partners like the United States remains a top priority.

US tightens grip on Huawei by revoking eight licenses in 2024

The US has revoked eight licenses this year, which previously allowed certain companies to export goods to Huawei in an attempt to exert pressure on the Chinese telecom giant. Earlier in May, the Commerce Department announced that it had revoked some licenses but did not specify the details.

The development occurred as Republican hardliners in Congress pushed to intensify measures against Huawei, which surprised the industry last August with a new phone featuring an advanced chip from Chinese manufacturer SMIC despite US export restrictions. The phone boosted Huawei’s smartphone sales by 64% in the first six weeks of 2024. Additionally, Huawei’s smart car components business has driven its fastest revenue growth in four years during 2023.

These details highlight the Biden administration’s efforts to hinder Huawei’s recovery despite previous measures aimed at weakening the company on national security grounds. Meanwhile, Huawei continues to deny being a security threat.

Why does this matter?

Such license revoking measures can be located as a part of the larger tech war intensification between the US and China, especially concerning chip market dominance. With the race between the two superpowers set to continue, it’ll cost the global economy enormously with a loss of trade revenue.

US Supreme Court declines Snapchat case

The US Supreme Court decided not to review a case involving a Texas teenager who sued Snapchat, alleging the platform did not adequately protect him from sexual abuse by a teacher. The minor, known as Doe, accused Snap Inc. of negligence for failing to safeguard young users from sexual predators, particularly a teacher who exploited him via the app. Bonnie Guess-Mazock, the teacher involved, was convicted of sexually assaulting the teenager.

Lower courts dismissed the lawsuit, citing Section 230 of the Communications Decency Act, which shields internet companies from liability for content posted by users. With the Supreme Court declining to hear the case, Snapchat retains its protection under this law. Justices Clarence Thomas and Neil Gorsuch expressed concerns about the broad immunity granted to social media platforms under Section 230.

Why does this matter?

The case has sparked wider debate about the responsibilities of tech companies in preventing such abuses and whether laws like Section 230 should be revised to hold them more accountable for content on their platforms. Both US political parties have called for reforms to ensure internet companies can be held liable when their platforms are used for harmful activities.

Mobile political spam triples ahead of 2024 US election

According to research conducted by Proofpoint, the volume of mobile political spam ahead of the 2024 election has tripled compared to the 2022 midterms. The study indicates a growing trend among US voters to seek information through digital platforms, which can increase their vulnerability to cybercriminal activities.

With 60% of American adults favouring digital media for news consumption and 86% using smartphones, tablets, or computers, there is a notable reliance on digital channels. Nearly all US voters (97%) have access to mobile messaging services. Despite the widespread trust in mobile messaging, Proofpoint warns that the surge in smishing, impersonation, and unwanted spam messages is nowadays eroding this confidence.

While many voters are cautious about fake news on social media, fewer recognise the significant risks associated with mobile messaging and email impersonation tactics. Notably, incidents of election-related smishing attacks have risen by over 7% in the past nine months compared to the previous period.

The increase in mobile political messaging, commonly used by campaigns and interest groups, has coincided with a rise in malicious activities. For instance, following former President Donald J. Trump’s guilty verdict in his ‘hush money’ trial, there was a notable 240% increase in unwanted political messaging within 48 hours, with reported volumes reaching tens of millions.

Why does it matter?

Proofpoint emphasised the importance of voters proactively defending themselves against impersonation attacks during this election season. They advise voters to be cautious with unsolicited messages, particularly those urging immediate action. The company also called on mobile operators to prioritise the protection of their users. Maintaining a healthy level of scepticism is crucial for all parties involved.

To mitigate the risks associated with malicious mobile messaging, voters are advised to refrain from opening attachments or clicking on links in such messages. Instead, it is recommended that you enter known URLs into web browsers directly. Thoroughly scrutinising all election-related digital communications is essential to verify their authenticity.

Global Xbox Live outage leaves gamers offline for over 7 hours

The Xbox Live service experienced a significant outage yesterday, affecting users worldwide and preventing them from accessing their Xbox accounts and playing games. Numerous user reports indicate that the online gaming platform was inaccessible for more than 7 hours, hindering players from engaging in cloud and offline games that need logging into an Xbox account.

Acknowledging the issue, the Xbox Support team stated, ‘We are aware that some users have been disconnected from Xbox Live. We’re investigating.’ This disruption affected users across various platforms, including cloud gaming, Xbox One consoles, Xbox on Windows, Android devices, Apple devices, and web services.

The Xbox team clarified that users may encounter difficulties signing into their Xbox profiles, experience disconnections while signed in, or encounter other related issues. Features relying on sign-in, such as most games, apps, and social activities, were unavailable. In a similar incident in May 2022, Xbox faced a widespread outage that impacted various services, including Games & gaming, Cloud gaming & remote play, and Store & subscriptions.

Infosys McCamish hack exposes data of over 6 million customers

Last year, a cyberattack on Infosys McCamish Systems affected over six million customers, as revealed in a new filing with data protection authorities. The breach, first reported in February, was traced back to November 2023, with unauthorised activity occurring between 29 October and 2 November 2023.

The compromised data includes Social Security Numbers, birth dates, medical records, biometric data, email addresses, usernames and passwords, driver’s license or state ID numbers, financial account details, payment card information, passport numbers, tribal ID numbers, and US military ID numbers.

Infosys McCamish Systems, an outsourcing service provider for financial and insurance companies, began notifying affected customers on 27 June, several months after the incident. With the help of third-party eDiscovery experts, the company conducted a thorough review to identify the compromised personal information and its owners.

The company has informed impacted organisations and offers 24 months of credit monitoring to affected individuals, although there has yet to be evidence of stolen information being used fraudulently. The LockBit ransomware group is believed to be behind the attack, which encrypted over 2,000 computers. The stolen data is expected to be used for phishing and identity fraud.

Japan unveils AI defence strategy

The Japanese Defence Ministry has unveiled its inaugural policy to promote AI use, aiming to adapt to technological advancements in defence operations. Focusing on seven key areas, including detection and identification of military targets, command and control, and logistic support, the policy aims to streamline the ministry’s work and respond to changes in technology-driven defence operations.

The new policy highlights that AI can enhance combat operation speed, reduce human error, and improve efficiency through automation. AI is also expected to aid in information gathering and analysis, unmanned defence assets, cybersecurity, and work efficiency. However, the policy acknowledges the limitations of AI, particularly in unprecedented situations, and concerns regarding its credibility and potential misuse.

The Defence Ministry plans to secure human resources with cyber expertise to address these issues, starting a specialised recruitment category in fiscal 2025. Defence Minister Minoru Kihara emphasised the importance of adapting to new forms of battle using AI and cyber technologies and stressed the need for cooperation with the private sector and international agencies.

Recognising the risks associated with AI use, Kihara highlighted the importance of accurately identifying and addressing these shortcomings. He stated that Japan’s ability to adapt to new forms of battle with AI and cyber technologies is a significant challenge in building up its defence capabilities. The ministry aims to deepen cooperation with the private sector and relevant foreign agencies by proactively sharing its views and strategies.

Croatian hospital suffers network outage in ransomware attack

The University Hospital Centre in Zagreb, Croatia, was hit by a cyberattack on 27 June, claimed by the LockBit ransomware group. The attack crippled the hospital’s networks, forcing emergency patients to be redirected to other facilities. Despite the disruption, hospital officials assured that patient safety was never compromised. Over 100 experts worked tirelessly to restore the IT systems, bringing the hospital back online within 24 hours.

LockBit, a Russian-affiliated ransomware group, posted on its dark leak site that it had stolen a large cache of sensitive data from the hospital in Croatia, including medical records and employee information. The hospital has not confirmed the specifics of the stolen data but has involved the authorities, and a criminal investigation is underway. LockBit, operating since 2019, has been linked to over 1,400 attacks globally and continues to evade law enforcement despite setbacks like the FBI and Interpol’s Operation Cronos.

The attack on KBC Zagreb coincided with multiple cyberattacks on Croatian government agencies by another Russian-linked group, NoName057(16). Known for targeting the critical infrastructure of nations supporting Ukraine, NoName denied responsibility for the hospital attack, emphasising their principle of not targeting medical facilities. NoName has been responsible for numerous cyberattacks across Europe, affecting several countries’ banking systems and critical infrastructure.