Book review: Code War: How nations hack, spy and shape the digital battlefield

Code War: How Nations Hack, Spy, and Shape the Digital BattlefieldAllie Mellen has written an interesting book that takes the reader through a comprehensive historical narrative of the past several decades’ worth of state-sponsored cyber attacks. While there have been numerous books on this topic, what makes this book unique is that she examines attacks that have been attributed to the US, Russia, and China, and shows their common and different approaches, and how they mix cyber warfare with their on-the-ground kinetic battles, such as what is happening in Ukraine over the past several years. 

Mellen comes to this from a deep experience with cybersecurity, including five years as an analyst at Forrester Research and several jobs for private cybersecurity vendors. 

Code War covers a lot of ground – from the earliest days of history to the present era, and how the modern digital age is just another way to repackage some of the ancient analog exploits. That deep historical coverage sets this book apart from other efforts that just skip lightly over the details and relevance of these antecedents. 

Each country has separate ways that they approach cybersecurity, both from offensive and defensive positions. Each also has different contexts in which it evaluates its cyber efforts. The US context is to ensure its national security, maintain a strong economy, and support various freedoms. China wants to maintain its regime stability, protect its national interests, and regain control and influence in Asia. Russia wants to maintain economic stability, ensure its citizens are loyal to the regime, and remain a world superpower. These mixed goals compete and conflict with each other. And while it is great to have goals, the contradictions and conflicts among them make it hard for each regime to clearly evaluate and execute its cyber efforts. 

Part of the problem, when seen in this tripartite context, is that the role and nature of the internet is vastly different among the countries. China’s internet is an instrument of state power, cultivated by absolute control. Russia’s internet is part of an hybrid digital/analog background of warfare against the world’s democracies. And in the US, the internet is part of maintaining a defensive and resilient digital ecosystem. 

One element in common with these efforts is their work to isolate their residents from the global internet community. These “splinternet” efforts restrict  freedom of speech and as Mellen notes, it “becomes more difficult to spread democratic values globally.” She chronicles the key steps of isolation and control of the internet with a series of well-researched case studies.

Mellen proceeds to deconstruct operational playbooks of the three nations, and how they have used cyberattacks to fulfill their social contracts with their citizenry. The American chapters cover a wide range of cyber misdeeds, including one chapter that tells the stories about how Nathan Van Buren and Aaron Swartz independently ran afoul of various federal laws about computer network security. Swartz got caught illegally copying millions of academic research articles in his campaign to make this information more publicly available, eventually killing himself rather than cop a plea. Van Buren was a Georgia cop who was charged with illegally unauthorized access to law enforcement databases, a case that went to the Supreme Court.  

Another historical luminary is a story of how Ben Franklin constructed one of the first disinformation campaigns. Granted, the internet was yet to be invented, but his playbook – using racist overtones – is very similar to many of the present day’s digital campaigns. “Disinformation operations have always been part of the US experience, they are just more easily scalable with the internet,” she writes.

Another story concerns how in the mid-1800s, Edgar Allen Poe was part of an abysmal voting practice called cooping, whereby people voted early and often, receiving free booze for their efforts. Mellen uses this to take a closer look at how American voting practice has become more secure, despite exaggerated recent claims to the contrary. This includes the efforts of the Cybersecurity and Information Security Agency that was once a leader in securing our elections before it lost its mission, its director Chris Krebs and at least a third of its staffers in 2024. 

Most IPJ readers are familiar with the stories about how Iran and Russia hacked our 2016 and 2020 elections, but Mellen dives into the details, showing how Iran for example tried to alter the final voting tabulations in 2020. Also a familiar tale for many readers is the plight of Phil Zimmerman, inventor of Pretty Good Privacy and how it became a legal lightning rod and the first technology to be designated a war-based munition. This has echoes of the current day whereby the Defense Department can designate Anthropic’s AI similarly (and perhaps equally unjustly).

Most of us are familiar with China’s Great Firewall, but Mellen describes its companion isolation and protective programs including the Golden Card Project (its own online financial network) and the Golden Shield Project (its national surveillance and censorship network). Some of these containment efforts have been abject failures, such as the Green Dam software that was a required application begun in mid-2009 to be installed on all Chinese computers and phones. The software was buggy and so unwieldy that the state eventually gave up the project within a few months.

Mellen analyzes numerous Russian attacks and susses out four common elements of their playbooks:

  1. denial of service attacks, including GPS and satellite jamming,
  2. Traditional espionage operations,
  3. Psychological operations, such as phishing, disinformation, and audio/video deepfakes, and 
  4. Malware-based data wipers.

Each of these elements has evolved over time, and carries its own hybrid physical attack vectors to amplify the attack. As I mentioned earlier, Ukraine is where all four of these elements were brought together alongside the physical warmaking machinery to form a single continuous battlespace.

Mellen’s tour through history and technology shows how political leadership has failed to live up to promises with its citizenry to maintain and improve their respective social contracts: China’s prosperity is crumbling, Russia’s safety is evaporating, and America’s economic divide continues to worsen. By having this deep historical dive, the reader can see where things went off the rails, and why.

Missing from her excellent treatment of world powers is a focus on Iran, although it is mentioned briefly in several case studies. Also missing is more than a passing glance at AI. 

Mellen concludes with a dark vision of the “fourth power,” that of the major tech companies who treat their users as “digital peasants living in a world of corporate feudalism. Users till the soil (creating data), pay taxes (such as subscription fees), and live in castles (the digital platforms themselves), having no say in how the kingdom is governed.” The real nation states like China, Russia and the US and the digital nation-states such as Google, Apple, and Meta all want your data and your attention so they can exploit you and leverage your resources.

The Hacker News: Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception

Unmasking impostors is something the art world has faced for decades, and there are valuable lessons from the works of Elmyr de Hory that can apply to the world of defensive cybersecurity. Before you dismiss this wonderfully written lede, you should know that during the 1960s, de Hory gained infamy as a premier forger, passing off counterfeit masterworks of Picasso, Matisse, and Renoir to unsuspecting collectors and renowned museums. Over the next several decades, more than a thousand of his works slipped past experts who relied on trusted signatures, familiar patterns, and reputable provenance.

I wrote a piece for The Hacker News about how finding fake network traffic is an important aspect of your cyberdefense.

The week where I nearly fell victim to scammers

Last week I was under attack., and it was completely my own doing. I nearly fell victim to two separate and independent scams. And while I pride myself on recognizing and avoiding these things (perhaps too much, given these situations), it just shows you how anyone can be manipulated.

Let’s talk about the one involving a major sale of Taschen art books. You have seen these coffee table beauties, they typically are quite expensive and cover a wide range of art (including movies and art posters). There was an ad running through my Facebook feed (a sample shown below) that promised all sorts of things, such as “to make room for new editions and updated print runs, we’re clearing a limited selection of archive titles from our warehouse.” Clicking on the ad’s “Shop Now” buttons brought you to an attractively designed page that showed book covers and sale prices that were around $5 a book. There were several warning signs that I ignored, because I was so excited about getting some bargain books: First, paltry descriptions. Second, the domain was a .shop one that didn’t seem to have any relationship with any Taschen brand itself. And the FAQ page looked like it had been written with AI, certainly not on the level of quality that I knew this publishing house was known for.

Now, you can find these books in many used book stores, and they go for at least $25 a piece . But I was blinded by the bargains and so I proceeded to order three books. With shipping, it came to about $30 total. Enter my credit card, and wait — the card was rejected. The name of the vendor was khdfaienceflume. The company was based in Hong Kong, and the purchase was originally in HK$. Okay, something phishy here. I went back and looked up the domain, where I found it was registered a week ago. (Big red flag.) Taschen is based in Germany, btw. So i was saved by my credit card company’s fraud screen. I should have seen these warning signs, and should have followed the cardinal rule: if someone is selling something so cheap that is too good to be true, it probably is.

My second scam was a lot more involved, and it took me a week to figure it out. I got an email from Deven saying that “he was on Spotify and came across my2023 podcast interview.” He claimed to be able to help place me with interviews on other “big-name podcasts,” and mentioned the names of some of his clients that he has helped in the past. None of the names meant anything to me, but I figured what the heck and booked some time with him the following week. All seemed on the up and up until I started getting more than a dozen messages and texts suggesting that I watch some of his promotional hints and tips to making more money doing podcasts, leading up to the day of our eventual virtual meeting. I was starting to get annoyed, but I was eager to hear more about his “sure fire methods.”

Again, I was blinded by the “make money fast” message and missed a few of the cues: some slight misspellings in his messages, the lack of any actual pricing for his services (other than hints that he was expensive), and a failure to check out any of the “big name” clients. I actually connected to the pre-arranged meeting but Deven was a no-show. Then I started investigating: After checking into his clients’ websites, they all shared a common thread: they make a lot of money, they don’t show pricing, and they also don’t have contact info. It all was an elaborate hoax. (You can see a partial screenshot of one of these clients here.) All of the clients had very attractive websites that reflected a lot of time to create their own testimonials and detailed strategies on how they can help you “earn seven figures.” Yeah, right.

I am not sure how Deven was going to get my money, but once again, a major fail.

So: take a moment before you get sucked into the phishing vortex. And let my experiences in Scamville be a potent lesson to you. I n the meantime, I guess I am back to browsing the used book stores in person too.

The Hacker News: My Day Getting My Hands Dirty with an NDR System

As someone relatively inexperienced with network threat hunting, I wanted to get some hands-on experience using a network detection and response (NDR) system. My goal was to understand how NDR is used in hunting and incident response, and how it fits into the daily workflow of a Security Operations Center (SOC). Corelight asked me to write a sponsored piece for The Hacker News about my experience using their Investigator threat hunting software (screenshot below).

While I’m new to threat hunting, I do have experience looking at network traffic flows. I was even an early user of one of the first network traffic analyzers  from Network General called Sniffer. Sniffers were specialized PCs equipped with network adapters designed to capture traffic and packets. These computers were the foundation on which more advanced network monitoring platforms were built. That Wikipedia link shows you how far we have come with designing useful control interfaces.

My day getting down and dirty with Corelight’s Investigator taught me valuable lessons on how to create threat hypotheses, understand how threats move about a network, and, more importantly, gave me an opportunity to learn more about how networks operate and how they can be defended in the modern era.

Book review: Spies, Lies and Cybercrime by Eric O’Neill

Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm ScammersEric O’Neill has had an interesting career hunting down some of the worst spies and cybercriminals (he was one of the principals behind the takedown of Robert Hanssen). His book is a part travelogue, part instruction and best-practices manual, and part a detailed narrative of how cyber attackers ply their trade. If you haven’t heard of a few of the exploits (Colonial Pipeline, Solar Winds, WannaCry, and many others), this book is useful in describing the back story of these and others that have receded from the headlines. He draws on his own experiences at fighting these attackers from real life IT workers that are trying to keep their networks secure and protected, and “another grim reminder that once your data is out there, it’s out there for good—­ and the dark web has no return policy,” as he writes. The dark web – where criminals operate – has a gross cybercrime haul greater than Germany and Japan’s GDP combined.

We have already reached the place where we can’t trust everyday sites such as texts, FaceTime, Teams and other social sharing platforms. “Trust has become an uncommon commodity.”

O’Neill has spent years as a national security lawyer, corporate investigator and part of the threat response teams for cybersecurity vendors, so he knows the landscape very well. He wrote this book for a laudable purpose: “If enough of us become covert agents and learn to safeguard our personal data, we can also make the world safe from cyberattacks. This is how we start. One data point at a time.” His philosophy is that we must do better and start thinking like our adversaries if we are to repel their digital advances. “There are no hackers, there are only spies.” His years in law enforcement “left me with a simple axiom: Criminals are lazy. If they weren’t, they’d get day jobs.” So true. And being patient in understanding how your business has been compromised will pay off in finding where the breach took place and how to shore up your defenses.

The end of the book is worthy of clipping as a ready reference, what he calls the Spy Hunter Tool Kit. It is a list of dozens of valuable suggestions, such as never respond to a phishing text (such as the one I got while I was writing this review, asking me to change my PayPal password. (I no longer have a PayPal account, having gotten tired of all the scams and come-ons such as this one.)

His book was written while AI blossomed (I guess that is one way to describe it) and audio and video deepfakes became more common. One way to suss out if they are fake is to move your hands wildly at the beginning of a video conference call, although eventually AI will figure out a solution to this too.

If you are an experienced cybersecurity professional and want a book to give your friends, family, and co-workers, this is a good place to start with their education. If you are new to the cybercriminal world, this book will show you its depths and darkest corners, and hopefully motivate you to use better and unique passwords and other protective techniques.

This is a great introduction to cybercriminals and how to protect yourself from being their next victim.

Beware of OpenClaw, a new AI tool and potential threat

When I began writing about the potential dangers and benefits of AI a few years ago, I quickly came to the conclusion that the two are very closely tied and both directions present new challenges for enterprise IT managers. The latest development of Clawdbot (AKA Molt.bot or now called OpenClaw) are a very instructive case study. So what does it do, and what is the threat?

Basically, it is a powerful way to automate your digital life using a variety of AI agents. It is an AI-based assistant, and its use is spreading like wildfire. The top line is that OpenClaw is taking over — Token Security has found it has collected more than 60,000 Github reviews and nearly a quarter of its enterprise customers are using it and running it mostly from their personal accounts. They say “It is also a security nightmare, with exposed control servers that can lead to credential theft and remote execution over the internet.” This is no Chicken Little deal — “This rapid adoption signals a significant shadow AI trend that security teams need to address immediately.”

Here are two places that provide a deeper dive: First is security blogger Samuel Gregory, who has an excellent 15 minute demo video where he says “If you don’t know what you are doing, you can cause a lot of damage.” He shows you some of the guardrails you need to install, explains a bit of the bot’s history, and is well worth watching. But many of his suggestions mean you have to do a lot more work to isolate the bot from your online life — which shows quite starkly the tradeoff of security with ease of use.

Shelly Palmer, who actually uses the tech he writes about has this post where he documents what it took to get it up and running across his digital life. The bot connects his Slack, iMessage, WeChat, and Discord accounts. He has spent several hundred dollars in tokens to fine-tune it, and says it costs him anywhere from $10-$25 a day — “the bot just eats tokens.”

Part of OpenClaw’s problem is that you can run it on your local hard drive, but that it sends its feelers deep into your corporate SaaS infrastructure. For this to work, the bot needs access to your accounts and credentials. The bot’s website (mentioned above) is proud of this connectivity, saying up front that it “Clears your inbox, sends emails, manages your calendar, checks you in for flights. All from WhatsApp, Telegram, or any chat app you already use.” A story in El Reg goes into further details about the security implications. Not surprisingly, as they mention, “Users are handing over the keys to their encrypted messenger apps, phone numbers, and bank accounts to this agentic system.” Gulp.

The bot has its own package registry where you can download various “skills” as they are called to do various tasks for you. This sounds great until you realize — as this one researcher describes (sorry it is a Tweet, forgive me), there is absolutely no vetting, and 100% chance that something you have downloaded has evil intent.  Daniel Miessler Tweeted this warning shown below on how to harden any Clawdbot implementation. But many of the fixes depend on personal choices deeply rooted in the realm of Shadow IT. The issue is that it is easy to install, but difficult to install securely, something that many users might not realize in their joy of having a clean inbox and automatically delegating their mundane tasks.

Image

(Another excellent analysis of security issues can be found here.)

SOCPrime used its own tool to find users who have jumped on the Clawdbot bandwagon, and I am sure other threat intel tools will soon have similar posts.

“Yes, there are real issues: plain-text secret storage, misconfigured admin UIs on the open internet, and a skills ecosystem where people blindly install untrusted code,” says Matt Johansen. So keep your eyes open, scan your networks for the appropriate indicators, and educate yourself and your end users on what they are doing and how they do it more securely.

When spreadsheets first entered businesses, I recall how hard IT had to work to stay ahead of our users who were enamored with the new tech. But that was a single piece of software. With OpenClaw, we have an entirely new layer of digital infrastructure, and one that is complex and could be costly as well as open up multiple security sinkholes. Proceed with caution.

CSOonline: AI-powered polymorphic attack lures victims to phishing webpages

AI-fueled attacks can transform an innocuous webpage into a customed phishing page. The attacks, revealed in research from Palo Alto Networks’ Unit 42, are clever in how they combine various obfuscation techniques. The combination though can be lethal, difficult to discover, and represent yet another new offensive front in the use of AI by bad actors to compromise enterprise networks. You can read more in my story today for CSOonline.

I have too much security today

This morning, I had three tasks to complete that involved using various web sites. First, I had found an old recall on a part to my Cuisinart food processor. The recall notice cited a web page that (I assume) was such an old reference that the page has since evaporated.  Then I was trying to review the latest charges on my credit card. And finally, I wanted to pay a doctor bill online. Each of these tasks would have taken minutes to accomplish. Instead, the elapsed total time was several hours.

Now, I am not one of those Gen Z’ers that would rather text (or use the web) than talk to an actual human being in real time. Nevertheless, that was going to be how I would solve the Cuisinart Challenge. While the URL for the recall wasn’t in service, they had provided a phone number in the recall notice.

So I called the number and I was told all lines would be busy for the next five minutes and if I wanted them to call me back, just press 1, which I did. A few minutes later I got  my calll back. Once the support person took down my info, it quickly processed and a new part was promised within a few weeks. Excellent service: I think I bought that appliance probably 17 years ago.

Next, on to checking my credit card. I called the bank, they started to walk me through the process, and then we both realized that I was using a “secure” browser (Opera Air) that I remembered had some odd quirks, particularly because it blocks ads and popups. Sure enough, once I brought up Chrome, I was off to the races and able to login without any problems.

That made me think my doctor’s bill was suffering from the same condition, so I tried that in Chrome and hot diggity, problem solved and I could pay my bill just in time for lunch. So much for my morning.

Now, you might ask why am I using Opera Air? I got tired of all the popups and effluvia that I was experiencing with Chrome, and also annoying with the Googleplex in general. (Yes, I know, Opera is based on the Chrome code base, but that is just the way the modern browser worlds operate these days — with the exception of Safari and Firefox. Even Microsoft uses Chrome for Edge nowadays.)

Is there such a thing as using too much security? No. But there is a constant trade-off among security, privacy, and usability. It is a three-way tug-of-war. And the more you tug on one of the three legs, the more the other two will give way.

CSOonline: Secure web browsers for the enterprise compared: How to pick the right one

The web browser has long been the security sinkhole of enterprise infrastructure. While email is often cited as the most common entry point, malware often enters via the browser and is more difficult to prevent. Phishing, drive-by attacks, ransomware, SQL injections, man-in-the-middle (MitM), and other exploits all take advantage of the browser’s creaky user interface and huge attack surface, and the gullibility of most end users.

This is why enterprise secure browsers have finally gotten their moment. The category, which has been mostly flying under the radar for the past six years, has seen a lot of changes since I last wrote about them three years ago. Google announced its own entry into the field last year. Talon and Perception Point — who were in that post — were acquired by Palo Alto Networks and Fortinet respectively, showing how this technology has become part of a larger security context. To that end, other established security vendors have brought forth products in what Gartner is now calling the “remote browser isolation” market to complement their zero trust, secure services edge, or posture management security platforms.

I have updated my post for CSO this week and provide more recent information on how to evaluate this class of products, what are typical protective features, and describe the more than a dozen products and what they offer.

LinkedIn Live: Inside the threat hunt, turning signals into evidence

I recently moderated a live event (which has been recorded and can be accessed here, with registration), about how to do threat hunting using Corelight’s Investigator tool. My partner is Mark Overholser, who is their technical marketing engineer. Mark is an accomplished threat hunter and veteran of numerous Black Hat SOC tours of duty, so he has seen a lot of wonky circumstances go across his screens.

We talk about why being proactive is important in learning how to hone your investigations, how to use the MITRE ATT&CK foundation (shown above) and schema to hone your focus and guide your efforts.  (I wrote about the evolution of ATT&CK for CSO back in 2021 here), We also discuss how to drill down to suss out what is going on across your network. .

Corelight also has an excellent threat hunting guide that is keyed to the ATT&CK categories, with loads of suggestions to how you can leverage it to help in your hunts.