More stories

  • in

    FontOnLake malware strikes Linux systems in targeted attacks

    A brand of malware that has previously gone undetected is being used in targeted attacks against Linux systems. 

    According to researchers from cybersecurity firm ESET, the malware, named FontOnLake, appears to be well-designed and while under active development already includes remote access options, credential theft features, and is able to initialize proxy servers. FontOnLake samples first appeared on VirusTotal in May 2020 but the command-and-control (C2) servers linked to these files are disabled, which the researchers say may be due to the uploads.  The researchers added that Linux systems targeted by the malware may be located in areas including Southeast Asia.   ESET believes the operators are “overly cautious” about being caught and their activities exposed as almost all samples obtained use different C2 server addresses and a variety of ports. Furthermore, the malware’s authors make use of C/C++ and a number of third-party libraries such as Boost and Protobuf.  FontOnLake is modular malware that harnesses custom binaries to infect a machine and to execute malicious code. While ESET is still investigating FontOnLake, the firm says that among its known components are trojanized apps which are used to load backdoors, rootkits, and to collect information.”Patches of the applications are most likely applied on the source code level, which indicates that the applications must have been compiled and replaced the original ones,” the team says. 

    In total, three backdoors have also been connected to FontOnLake. The backdoors are all written in C++ and create a bridge to the same C2 for data exfiltration. In addition, they are able to issue “heartbeat” commands to keep this connection active.  FontOnLake is always joined with a kernel-mode rootkit to maintain persistence on an infected Linux machine. According to Avast, the rootkit is based on the open source Suterusu project.  Tencent and Lacework Labs have also published research on what appears to be the same strain of malware. ESET has also released a technical whitepaper (.PDF) examining FontOnLake.  Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    FBI arrests engineer for flogging nuclear warship data hidden in peanut butter sandwich

    The FBI and the Naval Criminal Investigative Service (NCIS) have arrested an engineer and his wife for trying to sell confidential military data. 

    On Sunday, the US Department of Justice (DoJ) named Jonathan and Diana Toebbe, of Annapolis, Maryland, as the suspects in a plot to sell information to a foreign government.According to the complaint, for close to a year, Jonathan — with the assistance of his wife — attempted to sell Restricted-class data in exchange for cryptocurrency.  Jonathan served as a nuclear engineer for the US Navy. During his time with the Navy, the 42-year-old worked on the Naval Nuclear Propulsion Program and had secured high-level national security clearance.  “Toebbe worked with and had access to information concerning naval nuclear propulsion including information related to military sensitive design elements, operating parameters, and performance characteristics of the reactors for nuclear-powered warships,” US prosecutors say.  On April 1, 2020, Jonathan allegedly sent a sample pack of information relating to the nuclear program to an unnamed foreign government, together with a letter that alleged read: “I apologize for this poor translation into your language. Please forward this letter to your military intelligence agency. I believe this information will be of great value to your nation. This is not a hoax.”  The DoJ has accused the engineer of then forming a relationship over email with someone he believed was part of this government. 

    ProtonMail was used for back-and-forth exchanges over the course of several months under the names “Alice” and “Bob.” By June 8, the contactee had sent Toebbe a $10,000 payment in Monero cryptocurrency in “good faith,” and several weeks later, the engineer allegedly acted.  The husband and wife traveled to West Virginia to an agreed drop location. While Diana assumed the role of a lookout, Jonathan then placed half a peanut butter sandwich at the drop site — and contained within was an SD storage card containing stolen nuclear reactor program information.  The SD card was then retrieved by the contactee — who happened to be an undercover FBI agent, who sent Toebbe a further $20,000 in cryptocurrency.  After the second payment was made, the engineer emailed the agent the decryption key required to access the information contained in the SD card.  The FBI was then able to verify the legitimacy of the data and a second drop was arranged for the price of $70,000. This time, Toebbe smuggled the SD card into a chewing gum package.  Among the stolen data was schematics for the Virginia-class submarine, a $3 billion design of which vehicles are in active service and are expected to remain so until at least 2060. It was almost time for law enforcement to act and so they arranged for yet another package of data to be exchanged — and in the next drop zone, the pair were arrested.  The Toebbes were arrested on October 9 and they are due to appear in a Martinsburg, West Virginia federal court on October 12 to faces accusations of conspiracy to communicate restricted data and communicating restricted data as violations of the Atomic Energy Act. The FBI and the NCIS are continuing to investigate.  “The complaint charges a plot to transmit information relating to the design of our nuclear submarines to a foreign nation,” commented Attorney General Merrick Garland. “The work of the FBI, Department of Justice prosecutors, the Naval Criminal Investigative Service, and the Department of Energy was critical in thwarting the plot charged in the complaint and taking this first step in bringing the perpetrators to justice.” Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    NEC scores deal to build Facebook transatlantic half-petabit cable

    Facebook Connectivity has handed a contract to NEC to build a subsea cable that will link the US to Europe. NEC boasted it would be the world’s first 24 fibre-pair subsea cable, and would be capable of carrying 500Tbps. It is the first transatlantic cable for Facebook, which said it was capable of delivering 200 times more capacity than the cables laid in the 2000s. Last year, the social media giant announced it was part of expanding the 2Africa cable system to include the Pearl branch that would add landing stations on the Indian Ocean and Persian Gulf at Oman, UAE, Qatar, Bahrain, Kuwait, Iraq, Pakistan, India, and Saudi Arabia. The extension makes the total length of 2Africa 45,000 kilometres, which Facebook says is the “longest subsea cable system ever deployed”, and would triple the cable capacity serving Africa. Facebook added it was looking at new ways to power subsea cables. “Consider, for instance, a transatlantic cable that runs between Europe and the United States at over 7,000 kilometres in length, and all those repeaters getting their electricity through the cable from shore. This makes the cable a very long power cord,” the company said.

    “To solve this challenge, engineers are working on buoys that can deliver power to the repeaters from the middle of the ocean. We’re exploring more sustainable ways to do this, harnessing a combination of wave energy converters and solar panels.”In March, Facebook was part of a group announcing the laying of two cables to connect Singapore, Indonesia, and North America. The first, named Echo and to be completed in 2023, will be built by Google and XL Axiata, while the second to be completed in 2024, dubbed Bifrost, would involve Telin and Keppel. Related Coverage More

  • in

    Tech giants expand Australian misinformation measures week after government criticism

    The Australian industry group advocating for tech giants, including Facebook, Google, TikTok, and Twitter, has expanded its voluntary code for addressing misinformation online after the Australian and US government made fresh calls last week for tougher social media regulation.The group, Digital Industry Group Inc (DiGi), said the expansion entails creating a new independent committee to police the voluntary code for misinformation and disinformation.These independent members will work with signatories, through an administration sub-committee, to oversee the various actions taken by signatories to meet their obligations under the code, DiGi said.The updated voluntary code will also see DiGi create a new complaints portal. The new portal will accept complaints from the Australian public where they believe a signatory has breached the code’s commitments. Signatories of the voluntary code are Apple, Adobe, Facebook, Google, Microsoft, Redbubble, TikTok, and Twitter.DiGi created the code in February, which consists of signatories committing to releasing an annual transparency report about their efforts to address disinformation and misinformation, and providing a way for users to report content with disinformation and misinformation. The code also calls for signatories to be cognisant of the Universal Declaration on Human Rights when developing proportionate responses to disinformation and misinformation.

    Australian Communications and Media Authority chair Nerida O’Loughlin said in a statement that the updated voluntary code mechanisms were “an important step” in reducing online misinformation and disinformation.O’Loughlin did note, however, that she was still concerned about the voluntary and opt-in nature of the code.”We will be watching how this works in practice and whether expanding the committee’s remit will be necessary,” she said.Reset Australia, a democracy advocate, took a firmer position, with its director of tech policy Dhakshayini Sooriyakumaran labelling the code as “laughable” due to its voluntary and opt-in nature.”The DiGi code is voluntary and opt-in, with no enforcement and no penalties. Clearly, self regulation does not work,” she said.”DiGi’s code is not much more than a PR stunt given the negative PR surrounding Facebook in recent weeks.”The changes come as the Australian and US government have criticised the efforts of social media platforms to address misinformation and disinformation, with a Facebook whisteblower last week accusing the social network of intentionally hiding vital information from the public for profit.During a testimony to the Senate, the whisteblower Frances Haugen labelled the company as “morally bankrupt” and that “the choices being made inside of Facebook” were “disastrous for our children, our privacy, and our democracy”.Days later, Australian Prime Minister Scott Morrison criticised tech giants for the conduct that occurs on their platforms, stating that social media platforms like Facebook have become a “coward’s palace” for trolls.”The companies that [do not] say who they are, well, they’re not a platform anymore. They’re a publisher, and you know what the implications of that means in terms of those issues. So people should be responsible for what they say in a country that believes in free speech.” Morrison said at a press conference.Meanwhile, Minister for Communications, Urban Infrastructure, Cities, and the Arts Paul Fletcher said last Wednesday that there was “no question that misinformation or disinformation is a problem on social media”.Fletcher said the government would keep the voluntary code “under close scrutiny” and did not rule out the possibility of further regulation for social media platforms.  “If we don’t think the voluntary code is sufficient then we will certainly consider more direct regulatory action,” he said.RELATED COVERAGE More

  • in

    McAfee/FireEye merger completed, CEO says automation only way forward for cybersecurity

    McAfee Enterprise and FireEye completed their merger on Friday, closing the $1.2 billion, all cash transaction that merges the two cybersecurity giants. FireEye announced the sale of its FireEye Products business to a consortium led by Symphony Technology Group (STG) in July, separating the company’s network, email, endpoint and cloud security products from Mandiant’s software and services. In March, McAfee sold its enterprise security business to STG in a deal worth $4 billion, paving the way for the two to be merged. The two companies now boast a combined customer base of 40,000, about 5,000 employees and almost $2 billion in revenue. “Aligning McAfee Enterprise’s device-to-cloud cybersecurity solutions with FireEye’s robust portfolio of products presents an extraordinary opportunity for helping keep customers everywhere safe and secure,” STG managing partner William Chisholm said. Bryan Palma, CEO of the new combined company, said the McAfee Enterprise and FireEye teams will be able to develop an integrated security platform powered by artificial intelligence and automation. In an interview, Palma told ZDNet that the sophistication of threats and the deficit of cybersecurity talent means companies will need to rely more on automation, artificial intelligence and machine learning. 

    “There’s just no way that people can keep up, and we’re seeing that. We’ve got nation-states now involved in making attacks and that’s very concerning because they obviously have very strong capabilities. But what we’re seeing is some of the techniques that were traditionally used by nation-states are now being used by criminal groups and hackers,” Palma said. “We also see these supply chain attacks, which we were obviously directly involved in at FireEye with everything that happened with SolarWinds. There are so many zero-days still out there and that’s still an entry point for many hackers. There’s ransomware and still good old-fashioned phishing. There’s a combination of really new, sophisticated threats that I think have raised the bar and then the traditional ways that hackers come after organizations.”Palma joined FireEye in February 2021, at the height of outrage and scrutiny over the SolarWinds scandal that is still being unraveled by the US government.  Palma added that there isn’t much overlap between the two companies, allowing each side to bring different things to the table. He said the merger will allow both companies to provide more robust endpoint services, cloud protection and security operations. For the future, Palma said the new company is focusing on leading the way with XDR and statistical models to help address the sophistication of adversaries. “Now that cybersecurity has gotten hot, there are a lot of what I’ll call ‘software companies’ out there. We’re a true, grounded security company and that’s what the people in our company are concerned about.” Palma said. “We really have a great bench of people with expertise who are very skilled in this area and very experienced.”When asked what the new company will be named, Palma explained that the companies will finish the fiscal year under the Mcafee Enterprise and FireEye names before deciding on what the new merged name will be.He said the company doesn’t own the McAfee Enterprise name beyond the end of 2021, so they will have to come up with something new for 2022. 

    Tech Earnings More

  • in

    Citizen Lab researcher disputes claims from NSO Group after UK court finds UAE ruler used Pegasus to hack ex-wife, lawyers

    A member of the team at the University of Toronto’s Citizen Lab is questioning the actions of controversial Israeli spyware firm NSO Group in the case of Princess Haya bint al-Hussein, who had her devices and the devices of her lawyers hacked amid a UK custody battle with Sheikh Mohammed bin Rashid al-Maktoum, ruler of the United Arab Emirates. 

    ZDNet Recommends

    Sheikh Mohammed and Princess Haya are locked in a custody battle over their two children and the ruler ordered agents from the UAE to hack into his ex-wife’s devices using Pegasus, the NSO Group’s widely-criticized spyware. The ruler even ordered her British lawyers’ phones hacked as well, drawing outrage from UK court officials who called the hacks “serial breaches of domestic criminal law,” “in violation of fundamental common law and ECHR rights,” and an “abuse of power” by a head of state. The tool has caused global outrage for months after Citizen Lab revealed that it was being used widely by repressive governments and cybercriminal groups to monitor dissidents, human rights activists and even some world leaders, including French President Emmanuel Macon.William Marczak, a senior research fellow with Citizen Lab, testified in Princess Haya’s case and told ZDNet that he felt compelled to participate in the trial because of how brazen Sheikh Mohammed’s actions were. Marczak was also intimately involved in the case, having notified Princess Haya about Pegasus being used against her hours before NSO Group contacted her lawyers. Marczak explained to ZDNet that he personally confirmed the use of Pegasus by forensically analyzing the phones, but said he first became aware of the possible use of Pegasus when he identified the IP address of the lawfirm Payne Hicks Beach among a set of potential victim IP addresses he developed in his research.During the trial, it was revealed that Princess Haya’s lawyers discovered their devices had been hacked because the wife of former UK Prime Minister Tony Blair, Cherie Blair, works for NSO Group and knows Fiona Shackleton, one of the lawyers involved in the case. On August 5, 2020, Blair was called by an NSO Group employee and told that “it had come to their attention” Pegasus was being used on the phones of Princess Haya and Shackleton. The NSO employee said they cut off access to the phones through Pegasus and needed help contacting Shackleton about the issue. 

    But Marczak disputed this retelling of events, saying he was the one who first told Princess Haya’s lawyers about the hack hours before NSO Group tried to contact them. “One interesting detail that emerged in the proceedings was that NSO Group had notified Princess Haya’s lawyers several hours after I did, despite the fact that the court found one of the targets was hacked as early as November 2019,” Marczak said.  “Here’s an interesting question, would NSO Group have notified Princess Haya’s lawyers had I not done my own notification?”What stood out most to Marczak was NSO Group’s atypically robust response, noting that it was not common for the spyware firm to cut off access to their tool.   “Not only did NSO Group notify the targets of the surveillance shortly after I did, but they also claim to have disconnected one of their customers over the matter,” he explained. “Furthermore, NSO Group said that they instituted a policy where their foreign customers are not generally allowed to spy in the UK. We see abuses of NSO Group’s Pegasus spyware all the time, but we almost never see NSO take remediative action like this.” Marczak’s testimony in the case centered on how powerful the Pegasus spyware is and he explained how the tool gives users full access to a person’s device without them knowing. He also confirmed that the phones were hacked by a single operator from the UAE. “This is one of the most naked abuses of government spyware I’ve ever seen. NSO Group and its customers sometimes try to justify surveillance against dissidents and journalists by pointing to national security or terrorism concerns, but it’s a lot harder to paint your ex-wife and her family court lawyers as terrorists,” Marczak said. “When the prospect of the UAE spying on Princess Haya’s lawyers came to light, I felt compelled to notify them and help them make sense of what had happened.”Marczak added that he could not think of another case where forensics confirmed that Pegasus was used this way.  

    He noted that there have been a few allegations of rulers using Pegasus for non-political reasons.He mentioned the case of a former Panamanian President, Ricardo Martinelli, who was alleged to have used Pegasus to spy on his mistresses, according to an extradition request from the US.Marczak added that there are now wider concerns that the spyware will be used in personal disputes by repressive world leaders. “It is an ongoing risk, especially when so many of NSO Group’s customers are places where the personal affairs of the leader can often get entangled with national security concerns.””There is nothing that the average person can do to defend against this, but the targets are often not average people.” He recommended that at-risk users consider disabling iMessage, FaceTime, WhatsApp and other messaging apps if they’re not using them because these are popular vectors for phone hacking. He also mentioned that it would help to segregate activity onto different devices, which can mitigate the damage if a single device is hacked. He suggested having one phone for work, one phone for a sensitive project you’re working on and one phone for personal life.NSO Group said it has cancelled its contract with the United Arab Emirates after it discovered how Pegasus was being used. “As the NSO letter of December 2020 makes plain, after its investigation NSO has adopted the extreme remedy of terminating its customer’s use of the Pegasus software. In commercial terms, this step is to be understood as having great significance,” Judge Andrew McFarlane, President of the Family Division in England and Wales, wrote in his ruling.But Marczak said the NSO Group’s flagrant actions prove more cases will emerge of Pegasus being misused in this way.”Without better regulation of the industry and its customers, this is inevitable,” Marczak said.  More

  • in

    Ransomware: Cyber criminals are still exploiting these old vulnerabilities, so patch now

    Some of the cybersecurity vulnerabilities most commonly exploited by cybercriminals to help distribute ransomware are years old — but attackers are still able to take advantage of them because security updates aren’t being applied.

    Cybersecurity researchers at Qualys examined the Common Vulnerabilities and Exposures (CVEs) most used in ransomware attacks in recent years. They found that some of these vulnerabilities have been known for almost a decade and had vendor patches available. But because many organizations still haven’t applied the available security updates, they remain vulnerable to ransomware attacks.The oldest of the top five vulnerabilities detailed in the analysis is CVE-2012-1723, a vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7, which was detailed in 2012. According to researchers, it’s been commonly used to distribute Urausy ransomware. This ransomware is somewhat basic, but some organizations have remained vulnerable because they haven’t applied the relevant security patches. Two other common vulnerabilities detailed by researchers are from 2013. CVE-2013-0431 is a vulnerability in JRE exploited by Reveton ransomware, while CVE-2013-1493 is a flaw in Oracle Java that is targeted by Exxroute ransomware. In both cases, patches to remedy the vulnerabilities have been available for over eight years. CVE-2018-12808, meanwhile, is a three-year-old vulnerability in Adobe Acrobat, which is used to deliver ransomware via phishing emails and malicious PDF files. Both Ryuk ransomware and what many believe to be its successor, Conti ransomware, have been known to use this attack method.See also: A winning strategy for cybersecurity (ZDNet special report).The most recent vulnerability on the list is Adobe CVE-2019-1458, a privilege escalation vulnerability in Windows that emerged in December 2019 and has been commonly used by the NetWalker ransomware group. Like the other vulnerabilities detailed by researchers, cybercriminals are have been able to continue launching successful attacks because the available security update hasn’t been applied.

    For IT and information security teams, applying all the patches needed to keep a network secure is often an uphill battle. “The rate at which vulnerabilities are rising is exponentially higher than the rate at which operations teams are patching. This is the number one driving factor for why vulnerabilities remain unpatched,” Shailesh Athalye, SVP of product management at Qualys, told ZDNet.”It is easy for operations teams to get overwhelmed when they do not have a prioritized list of patches or software listings provided from security teams.”Cyberattackers know that many organizations struggle with patching, so they are actively scanning for vulnerabilities that enable them to lay down the foundations for ransomware and other cyberattacks.  Patch management can be a complex and time-consuming process. Still, information security teams need to take the time to apply critical security updates, particularly if they’re known to be commonly exploited by cybercriminals and ransomware gangs.”There is no silver bullet to prevent ransomware and remediate vulnerabilities, but overall, driving processes for reducing an attack surface should be the goal,” said Athalye.”The important part of vulnerability management is the combination of vulnerability assessment, prioritization and remediation.”More on cybersecurity: More

  • in

    Singapore tweaks cybersecurity strategy with OT emphasis

    Singapore has tweaked its cybersecurity strategy to beef up its focus on operational technology (OT), offering a new competency framework to provide guidance on skillsets and technical competencies required for OT industry sectors. The revised national cybersecurity roadmap also looks to bolster the overall cybersecurity posture and foster international cyber cooperation. The 2021 cybersecurity strategy also would build on efforts to safeguard Singapore’s critical information infrastructure (CII) and other digital infrastructure, said Cyber Security Agency (CSA). The government organization said it would work with CII operators to beef up the cybersecurity of OT systems where cyber attacks could pose physical and economic risks.CSA defines OT systems to include industrial control, building management, and traffic light control systems that encompass monitoring or changing “the physical state of a system”, such as controlling railway systems. 

    “Many OT systems are historically designed to be standalone and not connected to the Internet or external networks. However, with the introduction of new digital solutions in OT systems to increase automation and facilitate data collection and analysis, this has introduced new cybersecurity risks to what used to be a relatively ‘safe’ air-gapped operating environment,” it said. To address such risks, enterprises needed a framework from which they could get guidance on processes, structures, and skills required to manage their OT cybersecurity. Called the OT Cybersecurity Competency Framework, it is touted to provide a “more granular breakdown” and reference of cybersecurity skills and technical competencies required for OT industry sectors. It aims to plug existing gaps in OT cybersecurity training, CSA said. Before, OT systems owners including those in CII sectors would take guidance from the Skills Framework for ICT, parked under SkillsFuture Singapore, to identify skills gaps and develop training plans.

    Jointly developed with Mercer Singapore, the new OT security framework offered roadmaps of various job roles and the corresponding technical skills and core competencies required. Both OT and IT systems owners could refer to reference guide to provide adequate training and plot employees’ career progression, while training providers could use it to identify technical competencies and certifications needed to support local training needs.In addition, the CSA Academy would host roadshows to help organisations on adopting the OT security framework based on their business requirements. The increased focus on OT cybersecurity was in line with Singapore’s updated cybersecurity strategy, which detailed efforts to assume a more proactive stance in addressing digital threats, drive the nation’s cybersecurity posture, and push international norms and standards on cybersecurity. Adjusted focus needed to address growing cyber threatsThese were essential amidst increased connectivity, digitalisation, and complexity in cyber threats, said Senior Minister and Coordinating Minister for National Security Teo Chee Hean, at the opening of the conference Tuesday night.Telecommuting, video calls, online shopping, and digital payment had become the “new normal”, as populations worldwide turned to online technologies to cope with physical restrictions around the global pandemic. These provided benefits and opportunities, and impact on businesses, jobs, and lives would be permanent, Teo said. He added that, each day, more companies and people were engaging in the digital space and such interactions were becoming more pervasive. New apps and services were launched every day, and technologies such as 5G, cloud, Internet of Things (IoT), artificial intelligence (AI), and data analytics were taking digitalisation to a new level. “But connecting more people, bringing in new services, and rolling them out fast, bring added risks. They open up a wider attack surface, and raise the likelihood, impact and cost of a breach,” Teo said. “Strategies to enhance security, on the other hand, are inherently aimed at stability, conservatism, and reducing risk. Instinctively, the two seem mutually exclusive. These are real dilemmas that all of us face.”

    Geopolitical tensions further compounded this growing landscape, threatening to bifurcate the technology world and increase digital risks, the minister said. Pointing to Operation HAECHI-I, a transnational joint operation targeting five types of cyber-enabled financial crimes, including voice phishing and money laundering, he said more than 1,600 bank accounts linked to these crimes were frozen, and $83 million intercepted. More than 585 individuals were arrested and at least 890 cases solved, he said, noting that the successful operation demonstrated what was possible if the global community worked together to make the cyber space safer and more secure. According to the Interpol, Operation HAECHI-I involved specialist law enforcement officers across nine Asian economies including Singapore, China, Indonesia, South Korea, and Thailand. Recent supply chain attacks including the SolarWinds and Kaseya breach also underscored the urgency for Singapore to invest in its capabilities and bolster the “trust, but verify” approach in its digital systems, said Teo. The need to continuously verify and validate all activity on the country’s networks would provide greater confidence to trust its digital technologies and devices, he said.These considerations drove Singapore’s updated cybersecurity strategy, which outlined its approach to safeguarding its wider cyberspace in an increasingly complex environment, the minister said. Amongst such requirements were the need to develop and roll out cybersecurity standards on a national level, to raise the minimum standard of cybersecurity in ICT products and services the country used.Teo said: “One key element of the revised strategy is going beyond protecting merely our critical information infrastructure, and working to secure our wider cyberspace given the increasingly widespread and interconnected use of digital technology in all domains,” he noted. “This needs to be underpinned by building organisational capability and talent development.”Singapore’s 2021 cybersecurity strategy further recognised the need to build consensus and deepen collaboration, in which it would look to advocate for a rules-based multilateral order in cyberspace and an interoperable ICT environment. Teo said: “Difficult as it may seem, we should work to reach consensus on rules, norms, principles, and standards. Given the borderless nature of the digital domain–some have likened it to a digital global commons–we need to aspire for global consensus. Singapore supports the creation of such a multilateral order in cyberspace. Countries need to work together to develop new governance principles, frameworks, and standards for the digital commons to preserve trust and confidence, and for it to work well, safely and securely for all of us.”Consensus-building is crucial to maintain an open, secure, and interoperable digital domain,” he added.Currently the chair of United Nations’ (UN) Open-Ended Working Group on Security, from 2021 to 2026, Singapore said it would contribute and drive discussions on international cyber norms as well as support global efforts to augment nations’ capacities to protect themselves against cyber threats. Here, CSA added, Singapore would call on the development and adoption of cybersecurity standards so a minimum level of cybersecurity was implemented in ICT products and services used by citizens and businesses. Earlier this week, Singapore inked an agreement with Finland to mutually recognise each country’s cybersecurity labels for IoT devices, and help consumers assess the level of security in such products. Touting it as the first of such bilateral recognition, Singapore said the partnership aims to reduce the need for duplicated testing. Asean also was the first regional group to subscribe, in principle, to the UN’s 11 voluntary, non-binding norms of responsible state behaviour in cyberspace, Teo noted. Asean member states currently were working to implement these norms and translate principles into tangible outcomes, he said, adding that cooperation at such regional level was an important building block and stepping stone towards global consensus. “Cyberspace transcends physical boundaries and many systems span different countries and jurisdictions,” he said. “Countries, therefore, need to collaborate closely to align our policy approaches to deal with and police cross-border cyber threats. We also need to collaborate at the operational level to respond to cyber threats rapidly and in a coordinated manner.”Singapore’s revised 2021 cybersecurity strategy comes five years after its first such plan was introduced in 2016. Moving forward, CSA said it would “explore expanding” regulations under the country’s Cybersecurity Act to include entities and systems beyond CIIs.RELATED COVERAGE More