The House Oversight Committee is about to convene a hearing on ransomware attacks with @ncdinglis, CISA's Brandon Wales, and FBI's Bryan Vorndran: oversight.house.gov/legislation/he…
House Oversight hearing on ransomware attacks is starting now:
I'll tweet highlights.
“We are at a tipping point," House Oversight chair Carolyn Maloney says. "Cyberattacks have become more common and potentially more damaging."
“We cannot afford to let up on our efforts to ensure coordination of anti-ransomware efforts across the entire federal government and between the public and private sector," Maloney says.
Ranking member James Comer begins his opening statement by asking for more details about the FBI email system hack over the weekend, but then spends the rest of his statement hitting Biden over "radical left-wing policies," BBB spending, inflation, and illegal immigration.
Maloney responds to Comer, noting job creation and unemployment level. All this at a cyber hearing. Sort of a great metaphor for how cyber is often sidelined by higher-profile partisan issues.
"I find the word chutzpah, is appropriate at this moment," Gerry Connolly says of Comer's attacks on the Biden administration, given what he calls Republicans' lack of oversight of the Trump administration.
Comer asks to interrupt Connolly, but as he begins talking, Maloney says it's time to get back on topic.
"Mr. Connolly has the time, he has worked hard on this issue, and he's absolutely right that we should focus on the purpose of this hearing."
Delivering his opening remarks, @ncdinglis says “the Biden administration supports legislative efforts to require cyber incident reporting — to include ransomware payments — to both the FBI and CISA.”
CISA Executive Director Brandon Wales says the recently launched ransomware.gov site "has had more than 45,000 page views, and our ransomware readiness assessment tool has been downloaded nearly 15,000 times."
Wales: “Given the importance of visibility into the true size and scope of cyber threats facing us, I urge Congress to move quickly on the urgent priority of adopting incident notification legislation.”
FBI Cyber Division chief Bryan Vorndran, on cyber incident reporting legislation: “I can't stress enough the importance of the FBI receiving full and immediate access to cyber incidents so we can act on them as soon as possible and in unison with our federal partners at CISA.”
Comer asks Vorndran about the FBI's decision not to immediately share the decryption key for the ransomware used on Kaseya and its clients.
Vorndran says the government had to balance long-term vs. short-term cybersecurity goals.
Vorndran: "We took an extensive process to develop a safe and effective way to deploy that decrypter key to the victims."
Inglis adds: "If you were to act in the very first instance, you might then expose your knowledge of what's happening, allow the criminal to escape, to take their accesses to various other customers that haven't yet been sprung, and to spring them at some later time."
Ralph Norman asks Inglis what the Biden admin has done to pressure Russia to crack down on hackers.
Inglis' list doesn't satisfy him.
“Just more words," he says. "You gave words, but you didn't have any specifics. It's just asking, it’s pleading with them."
Andy Biggs asks Inglis about cyber deterrence work.
Inglis: "Over the last few weeks or months, you have seen some evidence that [efforts] are beginning to succeed...It's not unlike climate change, which is decades in the making &...can't be turned around in a fortnight."
Classic congressional hearing moment:
Using precious time, Andy Biggs asks a question that's already been answered (re: Kaseya decryption key).
Vorndran says he's already answered the question but can do so again if Biggs wants.
Biggs asks him to do so.
Jamie Raskin asks if CISA automatically shares ransomware incident reports with FBI and USSS.
Wales says CISA almost always coordinates with FBI and USSS, especially when directly engaging with a victim organization.
Raskin: Does a ransomware report automatically go to every agency that needs to know about it?
Inglis: The system is designed to ensure that, but “the system is not perfect.” We will "work to correct" any coordinate failures.
Always interesting to watch cyber officials try to answer partisan questions that have only tangential links to cyber issues.
The House Oversight hearing has ended.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Attacks targeted Ukraine, Lithuania, Latvia, Poland, and Germany, as well as Belarusian journalists and dissidents.
In research presented at @CYBERWARCON, Mandiant said it's attributing these attacks to Belarus based on technical evidence and the fact that the targets are "most consistent with Belarusian interests."
Some Belarusians targeted before disputed 2020 election were later arrested.
Mandiant said it had “sensitively sourced technical evidence” that the operation was based in Minsk, as well as “separate technical evidence” specifically linking the Belarusian military to the campaign.
New: FBI Cyber Division chief Bryan Vorndran told House Oversight in written statement for the record that Biden admin is “troubled” that cyber incident reporting mandate doesn’t set up simultaneous reporting to CISA *and* FBI.
Going beyond what he said at the still-ongoing hearing, Vorndran's statement says the current legislation “fails to recognize the critical expertise and role” of DOJ/FBI.
Both CISA and the FBI “should immediately receive all information mandated to be reported,” Vorndran wrote.
Needless to say, this could throw a wrench into the plan to pass the painstakingly crafted incident reporting mandate that is in the House NDAA and is expected to be folded into the Senate NDAA soon.
I've asked the legislation's sponsors if they'll rework the provisions.
New: The hackers behind a watering-hole campaign against targets in the Middle East may be using software from the Israeli spyware firm Candiru, recently targeted by U.S. export restrictions, according to @ESET: subscriber.politicopro.com/article/2021/1…
In research being presented today at @CYBERWARCON, ESET experts say an IP address linked to Candiru in a recent @citizenlab report has ties to two of the malicious domain names in the watering-hole attacks.
These watering-hole attacks spoofed websites of Yemen’s parliament & interior ministry, Iran’s foreign ministry, Syria’s electricity ministry, @MiddleEastEye, and Hezbollah-linked TV channels.
Fake sites delivered malware that exploited web browser vulnerabilities.
📅🎂🎉 It's @CISAgov's third birthday. "Cyber is, to a large extent, where it's at nowadays," then-President Donald Trump said as he signed the CISA establishment bill into law. subscriber.politicopro.com/article/2018/1…
@CISAgov Two years and one day after creating CISA (i.e. one year ago tomorrow), Trump fired CISA's director, @C_C_Krebs, for debunking his election fraud lies, throwing CISA into the partisan Trump-era turmoil that it had successfully avoided since its creation. politico.com/news/2020/11/1…
A year after Krebs' firing, CISA is on firmer footing and playing a key role in the implementation of Biden's sweeping cyber EO.
Just this morning, CISA released EO-mandated "playbooks" to guide agencies' responses to vulnerabilities and cyberattacks. cisa.gov/news/2021/11/1…
Scoop: Senate HSGAC is working on a bill that combines the House's industry-friendly cyber incident reporting legislation w/ a bunch of programs to tackle ransomware.
Raises Qs about what happens to Warner/Rubio/Collins bill, which industry doesn't like.
* The House Homeland incident reporting legislation, with some tweaks and additions
* "Due diligence requirement" for companies facing ransom demands
* Ransomware task force
* "Ransomware vulnerability warning pilot program"
Due diligence req:
Before paying a ransom, a company would have to determine whether it could recover from the attack “through other means,” including by seeing if experts have published a decryption tool that works for them.
Neuberger: "We want to take a moment to encourage organizations to be on guard for malicious cyber activity in advance of the holiday weekend. To be clear, we have no specific threat information or information regarding attacks this weekend, but what we do have is history."
Neuberger notes that history shows that hackers often target companies over holiday weekends, when security operations centers may be understaffed or otherwise unprepared.