Newsroom Security to foil Cybercrime as a Service (CaaS)

July 29, 2024
by

I remember a humorous anecdote during a security workshop organized by the U.K. based press freedom organisation ARTICLE 19. The charismatic director Leopoldo Maldonado conducting the workshop spoke of a reporter in the restive Mexican state of Tamaulipus who had just been hacked. The reporter later discovered the Tamaulipus state governor had given a $10,000 USD bounty to black hat mercenaries contracted over the dark web from their base in eastern Europe to hack his password and uncover his sources. The reply from the journalist: “Why didn’t the governor just give me $10,000? I’d have given him the password in person!”

Gallows humour aside, whenever there is an uptick in cyberattacks against the news portals I helped my Mexican colleagues architect I find myself scanning the headlines across our frontpages: have our investigative journalists uncovered a scoop that some wealthy senator or extremely connected congressman with links to organised crime would prefer to keep quiet?

1.4 million hits in 15 weeks during an election cycle when readership is up.

Our news portals are among the most influential in the state of Quintana Roo.  The exposure means the attacks against our newsroom have gotten more advanced over time. The threats against our Editor-in-Chief, Pedro Canché, add an extra layer of complexity to our newsroom security, above and beyond that of traditional cybersecurity.

The attempts to censor the free press with cyberattacks are also crafted to have a chilling effect.  The constant DDoS attacks against our servers were reasonably simple to mitigate with CDN’s such as Cloudflare and now barely register after load balancing across three Virtual Private Servers.  The SQLi attacks from the Russian Federation pictured below against Chetumal News (backdated to 2021 to keep things interesting without revealing current countermeasures) make me wonder how this newspaper that serves the judicial capital on southern Mexico’s tropical Carribbean coast ever gained such a faithful readership from above the arctic circle?

Attempted SQL injections from the Russian Federation against our Chetumal News.

Its always advantageous to use country blockers available in most premium WAF’s (or the free plugin https://lite.ip2location.com) to make it difficult for your adversary.   Lockheed Martin’s pioneering paper on Intelligence Driven Computer Network Defense advised organisations to deploy countermeasures faster than its adversary can evolve to vanquish them and raise their expenditure in order to achieve their own actions on objectives.  Following this advice, the idea is to monitor and document your adversary’s TTPs (Techniques, Tactics and Procedures) to gain clues whether its a suspected script kiddie using Burp Suite or Hydra or perhaps a more sophisticated adversary deploying a botnet which specialises in predictable but relentless brute force attacks.

Its also wise to monitor if their is a change of location from where the reconaissance or attacks are occuring.  After IP country blocking the regions that are perpetrating the majority of attacks against our newspapers, the WAF (Web Application Firewall) tracked attacks from different regions.  The image below are attempted malicious file upload and directory traversal attack on the WordPress configuration file from a few years ago that originated from France.

It may seem like a game of wack-a-mole by country blocking entire continents but the idea is to make it get more expensive for your adversary.  This does reveal a worrying trend in Cybercrime as a Service (CaaS) where botnets can be hired in bitcoin and automated hacking tools can now perform sophisticated cyberattacks at the behest of technologically luddite politicians for a small fee.

The aim then should be that your newspaper is hardened against the most common cyberattacks–sanitized databases, input validation, which freemium WAFs provide.  Also remember, your newsroom is only as secure as your least trained reporter, but fortunately there are cybersecurity toolkits for journalists to raise the security posture of your publication.  It means the politicians who are attempting to censor your publication (we have a shortlist 😉 ) have to dish out much more dough to achieve an ever diminishing level of success.  Oftentimes, I have found these mercenary hackers will simply get bored and move on or the money to fund the cyberattacks will dry up.

jacob

has postgrads in Cyber Law from Deakin Law School; Cyber Crime from Griffith School of Criminology and Criminal Justice; and Cloud Computing and Virtualization from Charles Sturt. After spending the last several years consulting on tech and cybersecurity for newsrooms from México's noticiascancun.mx to South Africa's health-e.org.za he still finds time to write in the age of ChatGPT to keep his pencil sharpened.

Leave a Reply

Your email address will not be published.

facial recognition tech
Previous Story

Informed Consent for Data Collection In the Age of Facial Recognition Technology

cyber threat intelligence
Next Story

Cyber Threat Intelligence Tactics From Lockhead Martin to Sun Tzu

Latest from Cyber Crime

Go toTop