Microsoft Announces Free Election Cyber Defence Tools
Microsoft has revealed it recently disrupted domains associated with a Russian cyber attack group believed to be targeting US political groups ahead of the midterm elections
Microsoft has announce it will provide “state of the art” cyber security protection at no extra cost to all election candidates and campaign offices using Office 365.
The Defending Democracy Program, launched in April 2018, is aimed at protecting campaigns from hacking, protecting voting and the electoral process, increasing political advertising transparency, and defending against disinformation campaigns.
The AccountGuard initiative is aimed at providing a more comprehensive view of attacks against campaign staff and expedited recommendations to secure systems as well as continual guidance on how to make networks and email systems more secure and briefings and training to address evolving cyber attack trends.
Microsoft will also provide preview releases of new security features on a par with the services offered to its large corporate and government account customers. “Broadening cyber threats to both US political parties make clear that the tech sector will need to do more to help protect the democratic process,” said Microsoft president Brad Smith in a blog post.
He revealed that Microsoft’s Digital Crimes Unit (DCU) last week executed a court order to disrupt and transfer control of six internet domains created by a group widely associated with the Russian government and known as Strontium as well as Fancy Bear and APT28.
“We have now used this approach 12 times in two years to shut down 84 fake websites associated with this group. Attackers want their attacks to look as realistic as possible and therefore create websites and URLs that look like sites their targeted victims would expect to receive email from or visit. The sites involved in last week’s order fit this description,” said Smith.
The AccountGuard initiative, he said, is in response to concerns about security threats to groups connected with both US political parties in the run-up to the 2018 elections.
Smith said the special master appointed by a federal judge concluded in the recent court order obtained by DCU that there is “good cause” to believe Strontium is “likely to continue” its conduct.
“In the face of this continuing activity, we must work on the assumption these attacks will broaden further,” he said. “An effective response will require even more work to bring people and expertise together from across governments, political parties, campaigns and the tech sector.”
The court order transferred control of the six internet domains from Strontium to Microsoft, preventing Strontium from using them and enabling Microsoft to more closely look for evidence of what Strontium intended to do with the domains.
The six domains, said Smith, show a broadening of entities targeted by Strontium’s activities, with one appearing to mimic the domain of the International Republican Institute, which promotes democratic principles, and another being similar to the domain used by the Hudson Institute, which hosts prominent discussions on topics including cyber security.
While Microsoft has no evidence these domains were used in any successful attacks before the DCU transferred control of them, nor any evidence to indicate the identity of the ultimate targets of any planned attack involving these domains, the company has notified both organisations.
Microsoft said it will continue to work closely with the two organisations as well as other targeted organisations on countering cyber security threats to their systems. The company has also been monitoring and addressing domain activity with Senate IT staff the past several months, following attacks detected on the staff of two current senators.
“We are concerned by the continued activity targeting these and other sites and directed toward elected officials, politicians, political groups and think tanks across the political spectrum in the United States,” said Smith.
“Taken together, this pattern mirrors the type of activity we saw prior to the 2016 election in the United States and the 2017 election in France,” he said.
Microsoft plans to offer AccountGuard to countries outside the US “in coming months” as part of the evolution of its Defending Democracy Program, which Smith described as an important part of the company’s work to protect customers and promote cyber diplomacy around the world.
“While cyber security starts with Microsoft and other companies in the tech sector, it’s ultimately a shared responsibility with customers and governments around the world.
“Together with our industry partners, we’ve launched the Cybersecurity Tech Accord, now endorsed by 44 leading tech companies to protect and empower civilians online and to improve the security, stability and resilience of cyber space.
“And we will continue to call for stronger adherence to existing international norms and the creation of new international laws – like a Digital Geneva Convention,” he said.
Smith first mentioned the idea at RSA Conference 2017 in San Francisco, saying there was a need for a digital global convention that will call on the world’s governments to pledge that they will not engage in cyber attacks on the private sector, that they will not target civilian infrastructure, and that instead they will work with the private sector to respond to vulnerabilities, that they will not stockpile vulnerabilities and that they will take additional measures.
He said that in addition to a global convention, the world needs a new independent organisation like the International Atomic Energy Agency, which has addressed nuclear non-proliferation for decades.
Smith said the new organisation should bring together the brightest people in all sectors and should have the international credibility to confront and even identify attackers when nation state attacks occur.
- Cyber Incident Response Consultant, Italy
- Up to €60,000
Cyber Incident Response Consultant, Italy Up to €60,000 Cyber Incident Response Consultant is needed to join a global consultancy whose cyber business unit are continuing to their investment in the growth of their team. The Cyber Incident Response Consultant role is client facing that will join an award-winning team that deliver varied, interesting and often challenging work to a wide range of prestigious clients. The Cyber Incident Response Consultant MUST have current experience taking a client through the complete IR / triage process and have a blend of both technical and commercial (identifying and developing new business opportunities within a client) Proactive Incident response, forensics and eDiscovery experience is a MUST. The Cyber Incident Response Consultant must be happy to travel. Key attributes should also include; stakeholder engagement, mentoring of team members, a collaborative working style. Technical experience must include; demonstrable experience within an cyber incident response, Forensic, cyber etc. Additional certifications could / should include GIAC certified (Intrusion analyst, incident handler, forensic handler) Any of the following are very desirable also CREST Certified Network Intrusion Analyst (CCNIA) CREST Certified Host Intrusion Analyst (CCHIA) CREST Certified Malware Reverse Engineer (CCMRE) CREST Practitioner Intrusion Analyst (CPIA) Career development and the opportunity to influence, apply today for more information.
- Data Consultant
- Up to £90,000 Base
Data Consultant Location: London Salary: Up to £90,000 basic DD7692 A leading Google Cloud Platform (GCP) Provider who is looking for a Data Consultant, based in London. Experience with GCP or other similar platforms (AWS, AZURE etc), experience with GCP technologies as well as experience with Machine Learning, Data Mining and Data Analytics. The Data Consultant will be responsible for design solutions for customers and providing technical knowledge in customer meetings. Ideally, the Data Consultant will have experience transforming the way companies work by building company-centric solutions on the Google Cloud Platform or similar cloud platforms. Our client is a Premier Google Cloud Partner, offering an exciting opportunity to work with innovative technology whilst giving you the chance to grow and develop your career. You will have the opportunity to benefit from a number of training courses at several Google locations.
- Senior Delivery Consultant Emerging Technologies
Senior Delivery Consultant Emerging Technologies The Senior Delivery Consultant will work on pure retained executive search mandates in the emerging technology sector. The Senior Delivery Consultant will work closely with the practice lead to complete research and deliver the assignment to completion. This is a senior role with both client and candidate contact, although you will not have a fee generation target. A generous commission structure will exist linked to the successful delivery of assignments. Come and work for a business where the client is retained and you can focus 100% of your time and efforts headhunting the best talent out there in the market! Ref: AMSDC Salary: Dependant on Experience Location: Beckenham
- SOC Manager / Threat Hunting Service Lead, Cyber
- £85,000 +
REFCH7713 SOC Manager / Threat Hunting Service Lead, Cyber £85,000 + Bracknell SOC Manager / Threat Hunting service Lead needed- must be commutable to the Reading / Bracknell area. We are looking for a SOC Manager / Threat Hunting Service Lead to aid in building out a new SOC / Threat hunting (IR) service offering. An in-depth technical background is essential, experience across SOC SIEM/ Threat Hunting (IR) tools, processes, techniques, operational is a MUST. The role will include, but not limited to; Establishing the technical process, building operational capability, managing and hiring team, creation of policy/playbooks, fine turning of the go-to-market collateral etc. Apply today for more information or contact me directly on Chris.Holt@dclsearch.com or 07884666351 Cyber Security Jobs, Information Security Jobs, SOC Manager Jobs, SOC Jobs