Cybersecurity

Cyber crime – should we be hacking back?

Hannah Kuchler

JP Morgan Chase. Sony Pictures. Target. Anthem Healthcare. Fiat Chrysler. All of these companies have been hit by high-profile cyberattacks in the past 20 months, rattling the confidence of their customers and employees, and forcing them to spend more to improve their defences.

But for John Strand, these attacks have been great for business. A cybersecurity expert based in the remote Black Hills of South Dakota, Strand specializes in a new approach to protecting companies from hackers, known as “active defence” – an aggressive alternative to simply relying on traditional passwords and firewalls.

“It has been attack after attack after attack. My business has skyrocketed. I feel like I should send the Chinese a Christmas card saying thank you for a wonderful year,” he said.

Businesses such as Strand’s use tactics to lure hackers into traps, or to trace their steps to discover the origin of an attack. But there are others who offer more controversial – and probably illegal – methods to “hack back” against cyber criminals. Some quietly resort to such tactics, while others want to but are afraid of running foul of the law. Legal or not, some say hacking back is necessary given the threat.

After a spate of devastating attacks, companies and governments are mounting a fightback to reinforce their defences, and find more active ways to neutralise the threats from attackers. But the technical advantage lies with the attackers, while legal and political considerations limit how far potential victims can go.

Some 46% of US companies have raised their cybersecurity budgets in the past two years, with half saying they will spend more in the next two, reports the Ponemon Institute, a cybersecurity research centre.

“There is an unprecedented level of interest in active defence and frustration with the reactive approach,” says James Lyne, Global Head of Research for Sophos, a web security specialist.

The spike in defence

Using funds from the US Defense Advanced Research Projects Agency, Strand helped create a set of 20 tricks and traps to thwart cyber criminals. Downloads of the Active Defense Harbinger Distribution kit have almost doubled in the past two months, to an average of about 500 a week. His “active defence” sessions at the upcoming security conference Black Hat in Las Vegas have already sold out. There is a “huge spike” in interest in active defence after each big cyberattack, Strand says.

The onslaught of cyberattacks have shown how vulnerable every sector is, from banks to retailers, entertainment companies to healthcare providers. They want to bolster their defences to protect the customer data, intellectual property and financial information that is the lifeblood of their business – and a treasure trove for hackers.

Lyne showed how active defence techniques could be used to trace a hacker in a 2013 TED talk. He accessed cloud services used by a hacker group, found their phone numbers and used GPS information to pinpoint their office building. He was even able to find pictures of the hackers’ Christmas party.

But finding them was the easy part. “Despite the theft of millions of dollars, the cyber criminals haven’t been arrested and at this point possibly never will,” he said. “Most laws are national despite cyber-crime conventions, while the internet is borderless and international by definition.”

Deploy the honey badger

Cybersecurity specialists categorize the main active defence tactics as the three As: annoyance, attribution and attack. Only two of the three As are considered above-board, however.

Annoyance involves tracking a hacker and leading him into a fake server, wasting his time – and making him easy to detect. A new generation of start-ups is specializing in building traps for data centres, including two Israeli companies, TrapX and Guardicore.

Attribution uses tools to trace the source of an attack back to a specific location, or even an individual hacker. The two most popular tools in the ADHD kit are attribution techniques: the “honey badger”, which locates the source of an attack, tracking its latitude and longitude with a satellite picture; and beacons, which are placed in documents to detect when and where data is accessed outside the user’s system.

But it is the third A, attack, that is most controversial. To “hack back”, a company accesses an alleged hacker’s computer to delete its data or even to take revenge. Both of these steps are considered illegal.

Vigilante justice

Strand has seen companies so frustrated that they want to hack back. A Malaysian bank contacted him for help to track down some hackers – but he turned the job down because he feared aiding “vigilante justice”.

“We don’t work cases like that. I don’t want to pick up a newspaper and find out a hit has been taken out on a hacker in another country,” he said. “I’m terrified of what some banks, not necessarily US banks but some international banks, do to dissuade attackers.”

Chris Hoff, Security Chief Technology Officer at Juniper Networks, is integrating elements of active defence into its products. “The dirty little secret is if there were no worries ethically and legally, everyone wants a ‘nuke from orbit’ button,” he says.

Instead, security lawyers have been forced to draw a line between what is legally acceptable “active defence” and illegal “hacking back” using a case that has little obvious relevance to the world of large-scale cyberattacks.

In 2011, a teacher in Ohio used a laptop that she didn’t realize was stolen for webcam sex chats with her lover. Absolute Software, which monitored stolen property for the owner, tracked down the laptop, intercepted her communications and took screenshots of her most private online moments.

Susan Clements Jeffrey sued Absolute Software and won, with the judge ruling that even if the laptop was stolen, the company could not break into it to monitor its use. Based on this precedent, cybersecurity lawyers have concluded that companies risk breaking the law if they enter another network, even if it is just to delete their own stolen data.

However, some companies evade these restrictions in US law by putting cyber-defence units in countries with few laws governing the internet. And some cybersecurity companies outside the US are also attacking hackers on behalf of their US clients, says David Cowan, an investor in security start-ups at Bessemer Venture Partners.

“If we didn’t have the restrictive laws we have, I expect the banks would have been much more aggressively attacking the sources of their threats. I’ve seen situations where vendors [outside the US] have, as a courtesy, attacked hackers on behalf of their [US] clients without charging for it.”

In the UK, Lyne adds, most lawyers have concluded the law is similar to the US. However, there was “quite some distance from legal clarity”, with some companies’ lawyers deciding that injecting code into a website to track an attackers’ IP address is legal, but inserting code that collects more information is malicious. Until there is clear and coordinated international law, how far companies can go with active defence depends on “the number of lawyers they have and the size and maturity of their security team”.

Former government officials acknowledge the frustration felt by companies who are told to rely on the FBI or intelligence agencies to respond.

Howard Schmidt, former White House cybersecurity adviser to President Barack Obama and former President George W Bush, says there is a “big discussion” on whether companies should be able to hack back. “There’s a tremendous amount of frustration.”

If a person has their car stolen and finds it abandoned, they are legally allowed to get back in it, he says. “In cyber it doesn’t work that way. It is a felony to do that. You need a body that will do it for you.”

However, many cybersecurity experts see serious problems with allowing companies to hack back. Pinpointing exactly who committed the attack is difficult, so companies risk targeting innocent users. “At the root of all of this is the issue of attribution,” says Hoff. “Most people can’t do that.”

Lyne adds that hackers are “very good at exploiting the law” by using legitimate networks that lawyers will not give their companies permission to attack. “No lawyer is going to authorize offensive techniques to be used against the web server of Joe Bloggs, the flower seller whose computer just happens to be distributing some nasty malware.”

Striking back could also increase the problem, leading to more serious attacks and goading potential adversaries in the hacker community, as a cyber criminal’s supporters join the fight.

In a rare public attempt at retaliation, Israeli company Blue Security tried to turn the tables nearly a decade ago by responding to spam emails with a deluge of electronic traffic designed to disrupt the attackers. The counterattack brought a swift and devastating response: Blue Security’s systems were hit by a massive denial-of-service attack that took them offline, forcing the company to abandon its ill-advised countermeasures and, eventually, shut down.

For companies itching to go on the offensive, it is a cautionary reminder of just how dangerous the cyber frontiers have become. “In the Wild West, it was common to fight your own battles because you were afraid of the sheriff. But at some point that is not a scalable way to preserve justice,” says Cowan.

What is the government’s role?

When Obama held his first cybersecurity summit in Silicon Valley last February, he signed an executive order designed to encourage information-sharing between companies and government. That idea had been on the agenda for years, well before the recent spike in attacks, but some say it could help to create a legal framework for a more active cyber defence.

If companies felt more comfortable sharing information with the government, they could do the annoyance and attribution elements of active defence, then hand the information they discovered to law enforcement, who would take responsibility for counterattack.

“I, for one, would feel much more comfortable knowing the Department for Homeland Security, the Defence department and the FBI are part of the solution protecting our nuclear power plants. I don’t think they should be left to their own devices,” Cowan says.

As well as the executive order and an information-sharing bill, the Department of Justice is contacting general counsels to try to make them more comfortable with handing data – which might relate to their customers or vendors – to the government.

John Carlin, Assistant Attorney General for National Security at the Department of Justice, admits the laws on active defence are not keeping pace with the rising number of attacks. “In cyber in general it is incredibly fast-moving technology and fast-moving policy change. Almost every issue we confront in cyber is an area where you are looking to clarify the law,” he said.

However, some lawyers are looking beyond information-sharing to push for companies to be allowed to take more action. Ben Wittes, a senior fellow at the Brookings Institution and co-author of A Future of Violence, agrees the laws that bind companies hand the advantage to the attackers. “The offensive side is never thinking about legality, but the defensive side has loads of lawyers saying: ‘You can’t do that, you can’t do that, you can’t do that,’” he says. “In an environment in which you cannot reliably turn to government to protect you, the law should be relatively more permissive of reasonable steps you take to protect yourselves.”

Wittes says that writing law with self-defence provisions would be hard. But he suggests that legal authorities might end up simply turning a blind eye to companies’ cyber defences, even when they appear to cross the line. “I think the answer is not legalizing it but tolerating a lot of active self-defence,” he said. “A fair bit of it is going on. No one is saying it is OK. But no one is getting prosecuted for it.”

Have you read?
How to prepare for a cyberattack
5 economic principles of cybersecurity
How do we stop cyber crime from cramping our mobile lifestyles?

To keep up with the Agenda subscribe to our weekly newsletter.

Author: Hannah Kuchler is a Financial Times San Francisco correspondent, covering social media and cybersecurity. This article is published in collaboration with The Financial Times. Publication does not imply endorsement of views by the World Economic Forum.

Image: One of the largest cyberattacks is slowing global internet services after an organization blocking “spam” content became a target. REUTERS/Kacper Pempel

Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

Sign up for free

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

Stay up to date:

The Digital Economy

Share:
The Big Picture
Explore and monitor how The Digital Economy is affecting economies, industries and global issues
A hand holding a looking glass by a lake
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale
World Economic Forum logo
Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe today

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

How emotional intelligence is the best defence against GenAI threats

Öykü Işık and Ankita Goswami

November 15, 2024

1:46

Mexico is the target of more than half of cyber threats reported in Latin America

About us

Engage with us

  • Sign in
  • Partner with us
  • Become a member
  • Sign up for our press releases
  • Subscribe to our newsletters
  • Contact us

Quick links

Language editions

Privacy Policy & Terms of Service

Sitemap

© 2024 World Economic Forum