Inner City Press





In Other Media-eg New Statesman, AJE, FP, Georgia, NYTAzerbaijan, CSM Click here to contact us     .



These reports are usually available through Google News and on Lexis-Nexis
,



Share |   

Follow on TWITTER

Home -

These reports are usually available through Google News and on Lexis-Nexis

CONTRIBUTE

(FP Twitterati 100, 2013)

ICP on YouTube

More: InnerCityPro

BloggingHeads.tv
Sept 24, 2013

UN: Sri Lanka

VoA: NYCLU

FOIA Finds  

Google, Asked at UN About Censorship, Moved to Censor the Questioner, Sources Say, Blaming UN - Update - Editorial

Support this work by buying this book

Click on cover for secure site orders

also includes "Toxic Credit in the Global Inner City"
 

 

 


Community
Reinvestment

Bank Beat

Freedom of Information
 

How to Contact Us



UN Leak Says Hack Could Have Been Avoided Easily But No One Accountable Under Guterres

By Matthew Russell Lee, Exclusive, Patreon
BBC - Guardian UK - Honduras - CJR - PFT

UN GATE, Feb 6 – Amid the flurry of interest in the UN covering up having been hacked, Inner City Press nine days ago noted  that the UN has in the past not waited to cover up a hack but instead straight up gave information about activists to China - and at least one of the activists was killed.  

 Then the retaliation began, against the whistleblower and against Inner City Press which reported on it. Now on February 6, Inner City Press exclusively reported this leak about the hack, that the UN internally says could easily have been prevented. So who will be held accountable? It should be the king of impunity, Antonio Guterres. Here is today's UN leak to Inner City Press, more forthcoming: "From: Thomas Braun braunt [at] un [dot] org

Sent: Wednesday, February 5, 2020 10:34:19 PM Subject: Reported cybersecurity incident   [to all ICT Managers, Information Security Focal Points and BRMs/TSAs]  

Dear colleagues,   I assume that you are all aware of last week’s press reports about a cybersecurity incident affecting UNOV, UNOG and OHCHR.  The response to the incident was managed the affected offices, with UNOG / RTC-Europe taking a coordination role, but I want to provide a very brief summary and share some key lessons.  

The incident began with the compromise of a server in UNODC that was missing a critical security update. From there the attackers gained access to, and compromised further servers and infrastructure components of the network in both UNOV/UNODC and UNOG.  The compromise was detected several weeks later at OHCHR.  Containment, and other incident response measures were initiated immediately after the incident was detected.    

As soon as it became apparent that accounts from the UNOV were implicated, OICT was informed as well, and we provided support with the forensic analysis and detailed instructions for the required recovery steps.  While the exact extent of the damage is unknown, with respect to UNOG and UNOV the incident was determined serious, and the recovery required the rebuilding of core infrastructure components and resetting of passwords.  

As publicly reported, the initially compromised server was a SharePoint on-premises server.  However, the reason it was compromised a procedural failure to install a critical security update, there is no inherent security weakness or issue specific to that technology.   With respect to key lessons, the incident highlights the importance of compliance with established information security and ICT operational policies:  

1.   The initial compromise could have been easily prevented if the relevant security update had been applied.  Microsoft publishes security updates on the second Tuesday of every month and the OICT Cybersecurity Service releases advisories for these and other security updates. These advisories are distributed by email, and are also published in the CyberSec Advisory channel in Teams. The Teams channel is accessible to all users in the UN Secretariat, please let me know if you want to be added to the email group. 

2.   The initial compromise could have been contained, if it had been detected and responded to in a more timely manner. An intrusion detection system has been deployed in some locations, and it is essential that all alerts are followed up on as soon they are received. In addition, logs of critical systems should be reviewed to detect anomalous or suspicious activity. Once an incident has been detected or reported the OICT Cybersecurity Service can provide assistance and instructions to ensure a timely containment and mitigation of underlying risks. 

3.   The spread of the intrusion both within and between locations could have been mitigated if adequate network segmentation had been implemented. The need to segment the historically “flat” network architecture had been included in the ten-point action plan (2013), and the lack of network segmentation is a common root cause in the large scale incidents that affected the Secretariat in recent years.     Unfortunately, attacks like the one that lead to this incident are very common, and we will continue to see such breaches unless we significantly improve compliance in these areas.  I hope this incident serves as a wake-up call.   Best,  

Thomas P. Braun Chief, Cybersecurity Section Office of Information and Communications Technology United Nations   UNHQ FF-0776 Phone: +1.917 367 2671 | Mobile: +1.917 324 1047"

 In 2018, just before being ousted from the UN by Guterres and UN Lt Ronald E. Dobbins, Stephane Dujarric and now Melissa Fleming, Inner City Press published this, and later in 2019 from the UN Gate, this and this.

The quotedd David Kaye - after wanly raising to the UN questions abou its ouster of Inner City Press, what follow up did he do?  

The explanation of all of this shameful lassitude is that those few who want to cover and enter the UN will do anything for access, and when they see that a vindictive access controller like Antonio Guterres will not change position, they just let the issues go.

Profiles in Cowardice, and the continuing decline of the UN. We'll have more on this. 

***

Your support means a lot. As little as $5 a month helps keep us going and grants you access to exclusive bonus material on our Patreon page. Click here to become a patron.

Feedback: Editorial [at] innercitypress.com
SDNY Press Room 480, front cubicle
500 Pearl Street, NY NY 10007 USA

Mail: Box 20047, Dag Hammarskjold Station NY NY 10017

Reporter's mobile (and weekends): 718-716-3540



Other, earlier Inner City Press are listed here, and some are available in the ProQuest service, and now on Lexis-Nexis.

 Copyright 2006-2020 Inner City Press, Inc. To request reprint or other permission, e-contact Editorial [at] innercitypress.com for