Categories
Full Text Articles - Audio Posts

Seizing the Moment: Opportunities to Regulate Spyware and the ‘Pall Mall Process’

Spread the news

As abusive uses of spyware continue to proliferate, countries such as the United States, the U.K., France, and Costa Rica have led several high-profile initiatives to respond to the threat. Alongside these efforts has been important work by regional organizations and United Nations entities. At the heart of all of these efforts is an emerging understanding of the existential risk spyware poses to democracy, human rights norms, and civil society.

The “Pall Mall Process,” which emerged from the U.K.-France Cyber Initiative, is the most intriguing of recent developments. An international initiative led by France and the U.K., it has brought in other countries, the private sector, and civil society to “tackl[e] the proliferation and irresponsible use of cyber intrusion capabilities.” Pall Mall reflects an emerging consensus among key States that inaction on spyware is no longer an option for democracies, and that the costs of misuse – both for the rule of law and for national security – are untenable.

Several thoughtful assessments of the Pall Mall Process highlight gaps, most notably the narrow focus on “commercially available” spyware which, by its very nature, fails to grapple with irresponsible use and proliferation by governments, as well as the vast expenditures of money supporting the development of spyware capacity with few restraints on design or export.

But the key question now, and particularly for a new British government, is how it and its French counterparts might assume more robust leadership with respect to global spyware regulation. If Pall Mall is not to be consigned to the scrap heap of talking points, France and the U.K. must become advocates for national regulation and regional and global coordinated action. In doing so, they can learn from the United States, which has leveraged a mix of targeted sanctions and export controls to restrict the reach of certain commercial spyware technologies.

Spyware Abuses and the Pall Mall Process

Thanks to investigations by advocacy groups such as Citizen Lab, Amnesty International, and others, it is indisputably clear that spyware technology has been opportunistically deployed, under the cover of national security, to target journalists, human rights defenders and opposition politicians, and on a scale that defies belief. Alongside these galvanizing concerns, countries will also be mindful of the risk that these technologies pose to their own security, should they continue to proliferate, including into the hands of recalcitrant governments, criminals, and U.N. designated terrorist organizations.

The question is: what more can countries like France and the U.K. do, building on their first commendable step in the form of the U.K.-France Cyber Initiative? It is crystal clear that the spyware scourge needs global, comprehensive, and broad-ranging regulation. An additional question is: how can this Anglo-Franco partnership on spyware be leveraged to help the European Union build on the comprehensive Pegasus report of the European Parliament and more firmly bring into focus for its members the importance of regulating spyware in a comprehensive and practical way domestically?

The Pall Mall Process culminated in a February 2024 London conference, and brought together an unusual mix of twenty-five States as well as the African Union and the Gulf Cooperation Council, a political, economic, and social union between six countries in the Middle East. Like Costa Rica’s call for a moratorium on the sale, use, and transfer of spyware, Pall Mall’s goal is to bring groups of States together to focus on collective action and build a network of governments united in their willingness to act. While Pall Mall has potential, it has yet to produce concrete results.

A unique feature of Pall Mall is that it also brought together industry (BAE Systems, Google, Meta, and Microsoft), civil society, and academics. The Process advertised its goals as “establish[ing] guiding principles and highlight[ing] policy options for States, industry and civil society in relation to the development, facilitation, purchase, and use of commercially available cyber intrusion capabilities.” The declaration explicitly recognized the indispensability of oversight, precision, transparency, and accountability, terms that have long been absent from regulatory conversations among institutional actors about cyber intrusion capabilities, including spyware, and long sought by NGOs and civil society. Despite the clarion call to action for industry and governments alike, pressing them to “ensure that the development, facilitation, purchase, export, and use of commercially available cyber intrusion capabilities does not undermine stability or threaten human rights and fundamental freedoms, including in cyberspace,” Pall Mall was low on specifics.

So, what is the best way forward? Pall Mall’s current commitments are thin; setting out “steps” to tackle the misuse problem, including developing existing international export control frameworks, and unspecified domestic action in national jurisdictions. Ongoing dialogue was affirmed, and another conference proposed for 2025 (the details and substance of which has yet to emerge). But, regretfully, meaningful collective action from both countries and the wider group invited to the Pall Mall Process is still awaited. The moment is ripe for action and the U.K. and France are well placed to lead again, and they can do so by learning from effective and deepening domestic measures in the United States.

U.S. Action on Spyware Abuses

In this context, France and the U.K. should take note that despite a lack of broader traction some States have not waited for the crowd to move and are instead proceeding tentatively forward on regulation. Just two days before the Pall Mall conference, the U.S. State Department announced restricted visa access for “individuals believed to have been involved in the misuse of commercial spyware.” This policy may be applied to citizens of any country, even those whose citizens do not typically require a visa to enter the United States. Adding to this policy, the State Department announced in April 2024 that it was imposing visa restrictions on 13 different individuals who were “involved in the development and sale of commercial spyware” or their immediate family members.

On top of visa restrictions, in March 2024, the U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) announced sanctions against “two individuals and five entities associated with the Intellexa Consortium for their role in developing, operating, and distributing commercial spyware technology used to target Americans, including U.S. government officials, journalists, and policy experts.” The Consortium is a complex  network of companies founded by former Israeli military intelligence officer Tal Dilian (one of those named individuals now under U.S. sanctions), that have sold commercial spyware to repressive political regimes. All property of these individuals or entities within the United States must be blocked and reported to OFAC and any transactions involving any property or interests by these persons or entities are also generally prohibited. Any person or institution that does engage in transactions with these blocked persons or entities may face similar sanctions.

These sanctions are consistent with 50 U.S.C. § 1710 which became effective in April 2024. The statute, aimed at “confronting asymmetric and malicious cyber activities,” enables the president to sanction individuals the Treasury Secretary, Attorney General, and Secretary of State determine were involved in cyber-enabled activities that have or are reasonably likely to pose “a significant threat to the national security, foreign policy, or economic health or financial stability of the United States.” Possible sanctions include ineligibility for, or revocation of, visas to enter the United States or blocking of property and property interests. This type of concrete domestic action builds important gap-filling work in the absence of comprehensive global regulation of an industry in distinct need of sustained oversight.

What Is Needed Now?

If Pall Mall is to achieve political and legal significance, specific and collective action is required. France and the U.K. need to move forward with urgency and purpose, matching meaningful action with rhetoric. The U.K. and France have not taken any concrete domestic measures to further the goals outlined in the Pall Mall Process nor to regulate spyware or cyber-intrusion more generally – and certainly, nothing close to the steps taken by the U.S. government domestically.

For London, domestic legislative action is critical given the opportunities that lie ahead for a new government with a vast majority to move an ambitious legislative agenda on human rights abuses. The U.K. is now led by a Prime Minister, who, before he assumed office, was regarded as one of the U.K.’s leading human rights lawyers, with a long-standing reputation for upholding the rule of law. The U.K. has made some efforts related to cyber security, most notably through the introduction of the Cyber Security and Resilience Bill and the Digital Information and Smart Data Bill, both of which are still awaiting consideration by the U.K. Parliament. Regrettably, however, neither bill targets commercial spyware or related cyber intrusion technology. Instead, the former is focused on protecting important national infrastructure from ransomware and other cyber-attacks, and the latter deals with data privacy and protection. Presuming the expected timeline holds, both bills might be expected to become law in 2026.

The U.K. should use the legislative opportunities ahead to seek to harmonize national spyware regulation with the basic minimums the PEGA Committee endorsed including transparency, oversight, and accountability as well as specifying procedures to protect human rights through the surveillance lifecycle from design and development through use and transfer.  The U.K. should also adopt a liability-based model in parallel to any export regimes. Adopting a human rights-based approach to surveillance requires regulating the design, use, and transfer of these technologies, but also, as per the U.S. practice of getting tough with abusers, they would be well served by “naming and shaming” companies and individuals using all of the criminal and civil tools at their disposal.

Such initiatives would build on the promising developments regarding State accountability for spyware in the English courts. The Court of Appeal recently held in Shehabi and Mohanned v. Kingdom of Bahrain that Bahrain is not immune under the UK State Immunity Act from claims regarding the use of spyware to infect laptop computers of human rights and pro-democracy activists. This case involved the alleged use of “FinSpy,” produced by the Gamma Group (also known as FinFisher). A previous case found Saudi Arabia was not immune for the alleged use of Pegasus spyware.

For France, a series of opportunities lie ahead in the EU context. Paris can assume an invaluable leadership position by supporting implementation of the PEGA Committee Report and encouraging the EU Polish Presidency starting in January 2025 to lead on spyware regulation given Warsaw’s unique position, having suffered widespread spyware abuse at the hands of the previous Polish government. France can make it a political priority to support updating EU dual use regulations which were described by the PEGA Report as “weak and patchy.” France’s leadership in the Pall Mall Process must extend to the EU where it can build the necessary political will and momentum to ensure that export control regimes are strengthened such that all major exporting nations agree to parallel rules and oversight procedures. For Pall Mall to be concrete and meaningful, France should in parallel endorse and adopt a liability based model of accountability, which would be complementary to any export reforms — something like that which was proposed by the Mandate of the Special Rapporteur for counter-terrorism and human rights in 2023.

Given the current uncertainty around the upcoming U.S. election, the need for other States countries to assume and demonstrate leadership on tackling abusive surveillance technologies is acute.

Having established the partnership and now the process, the French and British have a unique opportunity to join the United States in a fight for the life and health of democracies and civic space worldwide. The U.K.-France Cyber Initiative and the Pall Mall Process are commendable first and early steps, ready to be re-energized, re-focused, and made practical to meet the moment.

IMAGE: Cyber security concept art. (Photo via Getty Images)

The post Seizing the Moment: Opportunities to Regulate Spyware and the ‘Pall Mall Process’ appeared first on Just Security.


Spread the news
Categories
Newscasts

9 AM ET: Steve Bannon released, Jeff Bezos op-ed, airline refund rules & more

Spread the news

We’ll take a look at how both 2024 campaigns are shaping up in the final week until election day. Former President Donald Trump ally Steve Bannon has been released from prison after serving 120 days behind bars. Washington Post owner Jeff Bezos has written an op-ed defending a recent decision. North Korean soldiers are reportedly being taught Russian commands. And, airline refund rules have changed in the US. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Spread the news
Categories
Newscasts

Who’s Destroying Ballots?

Spread the news

8AM ET 10/29/2024 Newscast
Learn more about your ad choices. Visit megaphone.fm/adchoices

Spread the news
Categories
Newscasts

The latest international headlines

Spread the news

AP correspondent Charles de Ledesma reports on a new israeli strike on Gaza; a new leader of Hezbollah is announced; a UN agency is sanctioned in Gaza; and a court will look again at a volcano eruption case.

Spread the news
Categories
Newscasts

8AM ET 10/29/2024 Newscast

Spread the news

8AM ET 10/29/2024 Newscast
Learn more about your ad choices. Visit megaphone.fm/adchoices

Spread the news
Categories
Full Text Articles - Audio Posts

Early Edition: October 29, 2024

Spread the news

Signup to receive the Early Edition in your inbox here.

A curated weekday guide to major news and developments over the past 24 hours. Here’s today’s news:

ISRAEL-HAMAS WAR

CIA Director Bill Burns floated a new 28-day Gaza ceasefire and hostage swap proposal during a Sunday meeting with Israeli and Qatari envoys, according to Israeli sources. Separately, Netanyahu yesterday signaled his willingness to accept Egypt’s two-day ceasefire deal. Analysts say any breakthroughs are unlikely until the result of the U.S. presidential election is known. Barak Ravid reports for Axios; Lauren Izso, Niamh Kennedy, Jeremy Diamond and Becky Anderson report for CNN; Patrick Kingsley reports for the New York Times.

Israel’s Knesset yesterday voted to bar the UN Relief and Works Agency for Palestine Refugees (UNRWA) from activity within Israel and prohibit Israeli authorities from any contact with the organization. The move, set to take effect in 90 days, will likely severely restrict the agency’s ability to operate in Gaza and the West Bank. Nadeen Ebrahim and Salma Arafa report for CNN; Andrew Roth reports for the Guardian.

At least 60 people were killed by an Israeli strike on a building where displaced Palestinians were sheltering in North Gaza early today, the Hamas-run health ministry said. Wafaa Shurafa, Samy Magdy, and Bassem Mroue report for AP News.

Only one medic remains at a North Gaza hospital following a weekend Israeli raid on the facility, the Hamas-run health ministry said in a statement urging international organizations to send medical staff to the enclave. Ido Vock reports for BBC News.

ISRAEL-HAMAS WAR — U.S. RESPONSE

The United States is “deeply concerned” the UNRWA ban will further exacerbate Gaza’s dire humanitarian crisis and has urged Israel to pause its implementation, a State Department spokesperson said yesterday. Barak Ravid reports for Axios.

ISRAEL-HAMAS WAR — INTERNATIONAL RESPONSE

UNRWA yesterday condemned the Knesset’s ban on its activities, with the agency’s Commissioner-General saying the “unprecedented” move violates Israel’s international law obligations and amounts to collective punishment of Palestinians. The Guardian reports; Michael Ross reports for CNN.

U.N. Secretary-General António Guterres yesterday warned of “devastating consequences” of the UNRWA ban’s implementation, adding there is “no alternative” to the agency. Richard Roth and Irene Nasser report for CNN.

A host of countries have sharply criticized Israel’s vote to ban UNRWA. Prior to the vote, Canada, Australia, France, Germany, Japan, South Korea, and the U.K. expressed “grave concern” over the legislation and urged Israel to “abide by its international obligations.” Ireland, Norway, Slovenia, and Spain also jointly condemned the move. Niamh Kennedy, Benjamin Brown, and Kareem Khadder report for CNN; the Guardian reports.

South Africa’s legal team yesterday delivered its main legal case accusing Israel of genocide against Palestinians to the International Court of Justice. AP News reports.

ISRAEL-HEZBOLLAH WAR 

Hezbollah today named Naim Qassem, its longtime deputy leader, as its new secretary general, replacing Hassan Nasrallah who was killed by Israeli airstrikes last month. Ben Hubbard reports for the New York Times.

ISRAEL-IRAN CONFLICT — U.S. RESPONSE

Israel’s Saturday attack on Iran “should be the end of the direct exchange of fire” between the countries, U.S. Ambassador to the U.N. Linda Thomas-Greenfield told the U.N. Security Council yesterday, warning Iran of “severe consequences” if it launches any new attacks. The Guardian reports.

U.S. PRESIDENTIAL ELECTION

Philadelphia’s District Attorney yesterday launched a lawsuit seeking to stop $1mn giveaways from Elon Musk’s PAC, arguing they violate state consumer protection regulations. The complaint, which does not allege a violation of federal election laws, is the first legal challenge to the contest. Amy B Wang, Perry Stein, and Trisha Thadani report for the Washington Post.

Incendiary devices were dropped into ballot drop boxes early yesterday in Oregon and Washington, sparking a fire which destroyed hundreds of ballots. Police said the incidents were connected and that a “suspect vehicle” has been identified. Patrick Marley and Yvonne Wingett Sanchez report for the Washington Post; Mike Baker reports for the New York Times.

Former President Trump bragged about a “little secret” between him and the House Speaker Mike Johnson (R-LA) set to be revealed after Election Day during a Sunday rally, sparking concerns about a potential scheme to settle the contested presidential election. Robert Tait reports for the Guardian.

Republicans yesterday asked the Supreme Court to step into the legal fights over Pennsylvania provisional ballots and Virginia voter purge challenges. John Fritze and Tierney Sneed report for CNN; Josh Gerstein reports for POLITICO.

For years, grass-roots Republican networks have laid the groundwork that could be used to contest the outcome of the 2024 presidential election, materials obtained by the New York Times show. Alexandra Berzon, Nick Corasaniti, Dylan Freedman and Duy Nguyen report.

Three members of the Washington Post’s 10-person editorial board stepped down yesterday, amid continuing backlash against the newspaper’s decision to not endorse a presidential candidate. Sareen Habeshian reports for Axios.

TRUMP LEGAL MATTERS

A federal judge yesterday granted a request by Trump’s legal team to delay the deadline for submissions on the former president’s immunity from prosecution over his efforts to subvert the 2020 election to Nov. 21. Spencer S. Hsu reports for the Washington Post.

OTHER U.S. DOMESTIC DEVELOPMENTS 

The United States is running low on some types of air-defense missiles amid a widening crisis in the Middle East, raising questions about the Pentagon’s readiness to keep up with demand. Nancy A. Youssef and Gordon Lubold report for the Wall Street Journal.

The Global Engagement Center, a State Department unit focused on combating state-backed disinformation campaigns abroad, is set to potentially lose its congressional authorization in December over Republican mistrust of its role in domestic U.S. politics. Joseph Gedeon reports for POLITICO.

RUSSIA-UKRAINE WAR

North Korea sent 10,000 troops to Russia, of whom some are already moving towards the Ukraine border, a Pentagon spokesperson said yesterday. Separately, North Korea’s foreign minister arrived in Russia ahead of a planned Moscow visit, Russian state media said. Paul McLeary and Robbie Gramer report for POLITICO; Reuters reports.

The United States will not impose new limits on Ukraine’s use of U.S.-supplied weapons if North Korea joins Russia’s war, the Pentagon said yesterday. Phil Stewart and Andrew Gray report for Reuters.

GLOBAL DEVELOPMENTS 

Thousands of opposition protesters rallied outside Georgia’s Parliament late yesterday after the country’s president denounced Saturday’s parliamentary elections as rigged and illegitimate. A partial recount is ongoing following reports of voting irregularities. Robyn Dixon and Mary Ilyushina report for the Washington Post; Reuters reports.

A German-Iranian national and longtime U.S. resident Jamshid Sharmahd was executed in Iran yesterday, sparking condemnation from the United States and Germany. Benjamin Brown and Hamdi Alkhshali report for CNN.

At least 40 Chadian troops were killed on Sunday in an attack on a military base close to the country’s border, the presidency said. While the statement did not name any suspects, local residents believe Boko Haram fighters were responsible. Natasha Booty reports for BBC News.

Outside powers are “fuelling the fire” of Sudan’s warring forces’ escalating attacks, Secretary-General Guterres told the Security Council yesterday. Edith M. Lederer reports for AP News.

The International Criminal Court’s prosecutor Karim Khan yesterday asked the court’s oversight mechanism to open an investigation into allegations of misconduct against him, saying he will “fully cooperate” with the inquiry. Reuters reports.

The post Early Edition: October 29, 2024 appeared first on Just Security.


Spread the news
Categories
Newscasts

AP Headline News – Oct 29 2024 08:00 (EDT)

Spread the news


Spread the news
Categories
Full Text Articles - Audio Posts

Fog and Akira ransomware attacks exploit SonicWall VPN flaw CVE-2024-40766

Spread the news

Fog and Akira ransomware operators are exploiting SonicWall VPN flaw CVE-2024-40766 to breach enterprise networks.

Fog and Akira ransomware operators are exploiting the critical SonicWall VPN vulnerability CVE-2024-40766 (CVSS v3 score: 9.3) to breach corporate networks via SSL VPN access.

CVE-2024-40766  is an Improper Access Control Vulnerability impacting SonicWall SonicOS, the company addressed it in August 2024.

“An improper access control vulnerability has been identified in the SonicWall SonicOS management access and SSLVPN, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash.” reads the SonicWall’s advisory.

“This issue affects SonicWall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions. This vulnerability is potentially being exploited in the wild. Please apply the patch as soon as possible for affected products. The latest patch builds are available for download on mysonicwall.com

In September, SonicWall warned that the flaw CVE-2024-40766 in SonicOS is now potentially exploited in attacks.

“This vulnerability is potentially being exploited in the wild. Please apply the patch as soon as possible for affected products. The latest patch builds are available for download on mysonicwall.com,” warns the updated SonicWall advisory.

Threat actors can exploit the vulnerability to gain unauthorized resource access and crash the impacted firewalls.

“An improper access control vulnerability has been identified in the SonicWall SonicOS management access and SSLVPN, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash.” reads the advisory.

The company urges customers to apply patches as soon as possible. The vendor also provided a workaround to minimize potential risks, they recommended to restrict firewall management to trusted sources or disable firewall WAN management from Internet access. Similarly, for SSLVPN, ensure that access is limited to trusted sources or disable SSLVPN access from the Internet.

Arctic Wolf researchers detected over 30 Akira and Fog ransomware intrusions since August, all leveraging unpatched SonicWall SSL VPNs (CVE-2024-40766). The experts noticed shared IP infrastructure behind the attacks.

“In early August, Arctic Wolf Labs began observing a marked increase in Fog and Akira ransomware intrusions where initial access to victim environments involved the use of SonicWall SSL VPN accounts.” reads the advisory. “Based on victimology data showing a variety of targeted industries and organization sizes, we assess that the intrusions are likely opportunistic, and the threat actors are not targeting a specific set of industries.”

Prior to August 2024, Fog and Akira ransomware attacks targeted a variety of firewall brands. However, since early August they focused SonicWall appliances. The researchers observed 30 new ransomware infections between the start of August until mid-October 2024. Akira ransomware was deployed in approximately 75% of the attacks, and Fog ransomware was deployed in the remaining 25% instances. The duration between initial SSL VPN access to acting on ransom/encryption objectives was as short as 1.5 to 2 hours in some intrusions, while in other intrusions the interval was closer to 10 hours.

There’s no conclusive evidence that CVE-2024-40766 and other remote code execution vulnerabilities were exploited to compromise SonicWall appliances. The researchers speculate that the VPN credentials may have been acquired through other means, like data breaches.

“Based on intrusions investigated by Arctic Wolf since early August, a significant amount of activity was observed involving Fog and Akira ransomware in environments using the SonicWall SSL VPN service. Visibility gaps hampered analysis of firewall logs across a subset of intrusions, while others suggested that existing accounts had been compromised.” concludes the report.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, SonicWall)


Spread the news
Categories
Newscasts

China says it’s ready to launch the next crew to its orbiting space station early Wednesday

Spread the news

AP correspondent Charles de Ledesma reports China is moving toward the next stage in the country’s long-term space program.

Spread the news
Categories
Newscasts

Democrats escalate attacks on Trump after comedian calls Puerto Rico ‘floating island of garbage’

Spread the news

AP correspondent Julie Walker reports Democrats attack Trump after a comedian at his rally calls Puerto Rico a ‘floating island of garbage’.

Spread the news