Tags Posts tagged with "Frank Artusa"

Frank Artusa

Pixabay photo

By Frank Artusa

For as long as there have been nation states, spies have been hard at work trying to gather intelligence for strategic advantage. Historically, the direct victims of such efforts have been government agencies, the military and corporate intellectual property, but recent events have put us all in the crosshairs when it comes to our digital communications.

Though sophisticated methods like collecting radio frequency emanations, tapping above ground and undersea communications cables, and other signals intelligence techniques, have been historically employed by adversary nations, few could have predicted the massive data breach recently perpetrated by an elite hacker group attributed to the People’s Republic of China called Salt Typhoon.

Salt Typhoon, a codename assigned by Microsoft’s cyber threat intelligence team, was first discovered in Fall 2024 to have compromised telecommunications systems and networks belonging to Verizon, T-Mobile, Spectrum and several others. The widespread compromise involved the exposure of data associated with phone calls, voicemails, and text messages impacting millions of Americans. The true extent of this massive breach has yet to be revealed, and it’s unknown whether the affected systems have been fixed.

The idea that any hacker group could obtain access to such critical infrastructure and persist, undetected, for apparently up to a year or more, is difficult to comprehend. The Federal Government’s Cybersecurity and Infrastructure Security Agency (CISA) indicated that Salt Typhoon was able to obtain access due to unpatched network hardware and leveraging entry points designed for use  by law enforcement, or “backdoors”.

Some experts blame the Communications Assistance for Law Enforcement Act (CALEA), a 1994 digital wiretapping law that compels telecommunications companies to assist law enforcement in conducting electronic surveillance with a court order. This tool by the very nature of its existence presents a potential backdoor into the telecom’s network. However, federal, state, and local law enforcement authorities utilize this technique to investigate criminal activity, with probable cause, to uncover evidence of crimes ranging from gang activity, organized crime, public corruption and everything in between. This makes CALEA a double edged sword: supporters laud its criticality to criminal investigations and detractors argue for its potential misuse by hackers or a corrupt government. 

Despite the obstacle described above, in December 2024 the FBI and CISA took the bold step of recommending that individuals utilize communication apps that offer end to end encryption (E2EE). E2EE is an encryption methodology that is used by apps like Whatsapp, Signal, and iMessage (when communicating between apple devices). 

E2EE makes it impossible for an interloper to read data due the advanced encryption utilized to encode data. As an example, it would require thousands, if not millions of years for a supercomputer to break encryption implemented by these applications. Quantum computing, a radical new computer processing technology poses a threat, but this innovation is still years away and governments are aggressively working to develop quantum proof encryption as well.

A clear use of the government’s own utilization of this E2EE technology was recently demonstrated when U.S. national security and defense officials used Signal to communicate tactical war plans in Yemen, albeit with unintended recipients.

Threats posed by advanced nation states capable of funding top tier cyber espionage operations is growing, with dozens of capable groups originating from Russia, Iran and North Korea as well as China. Additionally, this doesn’t include independent cyber criminal groups looking to steal and sell personal data. Considering the wide array of potential threats to digital data, E2EE appears to be one of the few tools guaranteed to stop hackers from eavesdropping on digital communications.

Internet Crime Complaint Center — www.ic3.gov

Frank Artusa, a resident of Smithtown, is a current cybersecurity professional and retired FBI Special Agent.

METRO photo

By Frank Artusa

This month New Yorkers were blanketed with scam text messages requesting payment of unpaid tolls. Another growing text based scam involves receiving messages from “wrong numbers” where the scammer attempts to then engage in casual conversation in order to befriend the victim and steal information. Perpetrators are utilizing increasingly sophisticated techniques and deceptive practices like these to trick people into providing access to their most valuable data. 

In recent years phishing, smishing, and vishing have become three of the most common attack vectors, among a dizzying array of others for compromising personal identifiers, valuable data, mobile phones, and computers. In 2024, the Federal Trade Commission reported $12.5 billion in fraud related losses suffered by the American public with identity theft and imposter scams comprising two of the top three categories.

Phishing is a scam where an attacker sends an electronic communication, usually an email, attempting to obtain access to financial accounts or other protected data, typically by getting a victim to click a link or enter personal information into a fake website. Other variations on this technique include vishing, typically done utilizing a voice call and smishing, a deception attempt via a text message. These are just a few of the common types of attacks, among many others, and it’s becoming quite a challenge to discern truth from deception.

In the realm of enterprise level cybersecurity, a best practice for keeping attackers out of networks is to adopt a “default deny” approach, that is, to block all access to business systems unless explicitly permitted via an allow list. Following this perspective to protect personal devices and accounts can also be beneficial to stopping bad guys by denying all attempts of communication from unknown numbers and email addresses.

When an email is received from an entity purporting to be a financial institution requesting personal information, never respond. Deny this solicitation by default and call the institution directly to verify the request. With text messages from an unknown number, stop the smishing attempt by not responding and immediately deleting the message, or call the sender directly to verify the legitimacy of their request. Individuals should never click on any links.

Vishing scams, which historically have been based on simple phone calls from people attempting to persuade victims to reveal valuable information, have now unfortunately evolved into attackers scouring social media accounts for the names of family members and even obtaining samples of their voices through pretext phone calls, then tailoring a targeted scam with an artificial “deepfake” call from the alleged family member. Again, in this case protection is achieved by denying the scammer from the outset and calling that family member or friend directly to verify.

Retirees are particularly vulnerable because they are less likely to be aware of the evolving cyber criminal landscape through work based training programs and are more accustomed to trusting historically dependable methods of communication like basic voice phone calls. The sad truth is that a high level of skepticism of all communications is necessary to combat these threats and protect important financial and personal data in both personal and professional environments. If any type of communication or correspondence is unusual, opt for a default deny approach.

Individuals who are victimized should contact the impacted financial institution to report and prevent further monetary damage. Concerns relative to stolen identity can be addressed by following the steps listed at www.identitytheft.gov. Unfortunately, cyber criminal investigations can be quite challenging due to the international nexus of most incidents; however, reports should be made to your local police department as well as to the Internet Crime Complaint Center at www.ic3.gov.

Frank Artusa is a current cybersecurity professional and retired FBI Special Agent.