<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/"
   xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom"
   version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title><![CDATA[ Government - Rapid7 Cybersecurity Blog ]]></title>
    <description><![CDATA[Rapid7 transforms data into insight, empowering security professionals to progress and protect their organizations.]]></description>
    <link>https://www.rapid7.com/blog/</link>
    <image>
      <url>https://blog.rapid7.com/favicon.png</url>
      <title>Rapid7 Cybersecurity Blog</title>
      <link>https://www.rapid7.com/blog/</link>
    </image>
    <lastBuildDate>Fri, 22 May 2026 03:18:06 GMT</lastBuildDate>
    <atom:link href="https://www.rapid7.com/tag/government/rss" rel="self" type="application/rss+xml" />
    <ttl>60</ttl>
    <item>
      <title><![CDATA[Iran’s Cyber Playbook in the Escalating Regional Conflict]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Following our recent published advisories, this publication is intended to outline a summary of the cyber activities associated with the tension. Based on the available information, we believe the conflict is beginning to show signs of expanding beyond a strictly regional crisis. Initial threat reporting pointed to a measurable increase in cyber activity linked to the crisis predominantly focused on hacktivist mobilization, with reports of phishing campaigns, and claims of data theft and disruptive operations. For a companion piece focused around our customers, dive into </span><a href="/blog/post/tr-detection-coverage-iran-linked-cyber-activity/" target="_self"><span style='font-size: undefined;'><em><strong>Rapid7 Detection Coverage for Iran-Linked Cyber Activity</strong></em></span></a><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Cyber activity by groups associated with Iran and their affiliated ecosystems have begun to surface. Much of the visible activity currently appears to have limited immediate operational impact as it consists primarily of website defacements, distributed denial-of-service (DDoS) attacks, coordinated messaging campaigns, phishing attempts, and reconnaissance against exposed digital infrastructure. While these incidents may appear opportunistic or symbolic, historical patterns of such behavior suggest that this activity can represent early-stage signaling, pressure, and preparatory shaping operations rather than isolated disruption.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Iran’s cyber ecosystem operates through a layered structure that includes state-linked advanced persistent threat (APT) groups, proxy actors, hacktivist personas, and sympathetic foreign collectives. Even when not centrally coordinated, these actors often converge on the same narratives and target sets during geopolitical crises, enabling simultaneous visible disruption and covert intelligence-driven intrusion activity. As the conflict evolves, this ecosystem provides a scalable and deniable tool for retaliation that can gradually intensify.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>It is very likely that the cyber risk will widen accordingly as the current conflict continues. Governments and organizations located in regions hosting U.S. military infrastructure or closely aligned with U.S. and Israeli positions may face increased exposure, particularly across sectors such as logistics, critical infrastructure, public administration, energy, and telecommunications.</span></p><h2>Strategic context and operational trends</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Iran does not operate according to a single publicly articulated cyberwarfare doctrine. Instead, its cyber strategy has evolved pragmatically as part of the country’s broader asymmetric security model. Since 2010, there has been an expansion of its cyber capabilities as instruments for intelligence gathering, internal control, retaliation, coercive messaging, and regional influence. Cyber operations are therefore best understood not as a separate military domain with a fully transparent doctrine, but as an adaptable component of the regime’s survival and strategic competition against outsiders.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Broadly speaking, Iranian cyber activity tends to serve three overlapping strategic objectives. The first is regime security and domestic control, in which cyber tools support surveillance, information control, and disruption of dissident or opposition networks. The second is strategic intelligence collection, in which state-linked actors target governments, defense organizations, technology providers, telecommunications firms, and critical infrastructure to gather political, military, and economic intelligence. The third is coercive signaling and regional influence, in which cyber operations impose costs on adversaries, shape perceptions, and demonstrate retaliatory capability while remaining below the threshold of overt interstate war.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>A key feature of this regime’s approach is the development of long-term access. Iranian APT groups often conduct sustained intrusion campaigns focused not only on immediate collection but also on access persistence, credential harvesting, and network familiarity. In a crisis environment, these pre-existing footholds can become strategically important, supporting either intelligence collection or later disruptive operations. This is one reason current low-visibility intrusions deserve as much analytical attention as public hacktivist claims. The visible DDoS or defacement campaign may dominate headlines, but the more significant strategic risk often lies in covert access established inside other targets. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Another defining feature of Iran’s cyber strategy is its layered operational model. State-linked APT groups frequently operate alongside contractors, proxies, persona-driven influence actors, and hacktivist collectives. This structure offers several advantages: it creates deniability, increases operational tempo; broadens the range of possible targets; and allows Iran-aligned ecosystems to combine disruptive spectacle with intelligence-driven depth. During periods of heightened tension, this blended model enables visible pressure operations to coexist with quieter espionage or pre-positioning campaigns. Current reporting on the conflict strongly supports this interpretation, with activist and proxy campaigns surging in parallel to concern over state-linked phishing, malware, wipers, and infrastructure-focused targeting.</span></p><h2>Iran’s threat actor landscape</h2><h3>State sponsored </h3><p style="direction: ltr;"><span style='font-size: undefined;'>Iran’s cyber capabilities are distributed across a hybrid ecosystem of state institutions, intelligence services, military structures, and semi-official operators. Rather than relying on a single centralized cyber command, Tehran appears to allocate responsibilities across different organs, primarily the Islamic Revolutionary Guard Corps and the Ministry of Intelligence and Security, with support from contractors, front entities, and affiliated personas. Strategic coordination of the cyber domain is overseen by the Supreme Council of Cyberspace, while operational activities are carried out through a mix of official and semi-official channels.</span></p><h4><span style='font-size: undefined;'>IRGC-linked actors</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>The </span><span style='font-size: undefined;'><strong>Islamic Revolution Guard Corp</strong></span><span style='font-size: undefined;'> (IRGC) maintains one of Iran’s most visible offensive cyber capabilities and has been associated with cyber espionage, influence operations, credential theft, and politically aligned disruptive activity. Among the principal IRGC-linked actors are </span><span style='font-size: undefined;'><strong>APT35</strong></span><span style='font-size: undefined;'> (also known as Charming Kitten or Mint Sandstorm), which has long conducted spear-phishing and credential-harvesting operations against diplomats, journalists, researchers, and policy communities; </span><span style='font-size: undefined;'><strong>APT42</strong></span><span style='font-size: undefined;'> is an actor particularly associated with surveillance and social engineering targeting dissidents, activists, journalists, and policy experts. </span><span style='font-size: undefined;'><strong>Cotton Sandstorm</strong></span><span style='font-size: undefined;'> (also known as Holy Souls and Emennet Pasargad), meanwhile, has been linked to both espionage and influence-oriented operations targeting regional adversaries and Western institutions. Recent reporting also highlights continued concern around malware associated with this broader actor set, including infostealing and espionage tooling used in phishing-led operations.</span></p><h4><span style='font-size: undefined;'>MOIS-linked actors</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>The Ministry of Intelligence and Security (</span><span style='font-size: undefined;'><strong>MOIS)</strong></span><span style='font-size: undefined;'> operates parallel cyber capabilities that tend to emphasize intelligence collection, long-term access, and strategic espionage. The most prominent groups in this cluster include </span><span style='font-size: undefined;'><strong>MuddyWater</strong></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><strong>OilRig</strong></span><span style='font-size: undefined;'> (also known as APT34). CISA has previously described MuddyWater as an Iranian government-sponsored actor conducting cyber espionage and malicious cyber operations across multiple sectors, while current reporting continues to place the group among the most operationally relevant Iranian state-linked threats in the present crisis environment. OilRig remains a longstanding espionage actor focused on governments, financial institutions, energy entities, and other strategic organizations.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>These actors illustrate Iran’s distributed cyber-operational model: Intelligence-driven access development, influence, psychological pressure, and opportunistic disruptive action are not separate lines of effort but parts of a broader strategic continuum.</span></p><h3>Parallel hacktivist and proxies</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Beginning in June 2025, a noticeable surge in hacktivist and proxy cyber activity accompanied the broader escalation of tensions in the Middle East. This reflects a recurring pattern observed during previous geopolitical crises, in which ideologically aligned non-state cyber actors mobilize alongside, or in parallel with, state-linked cyber operations. In the current confrontation, this dynamic has again expanded the cyber landscape beyond traditional state-directed espionage or sabotage.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>By early March 2026, several dozen hacktivists or proxy collectives emerged related to the conflict. These groups vary significantly in capability and reliability. Some focus on distributed denial-of-service (DDoS) attacks, while others conduct website defacements or hack-and-leak campaigns. Some primarily amplify claims of compromise that are exaggerated or only partially verifiable. Their significance, therefore, lies less in technical sophistication than in the cumulative pressure they place on defenders and the broader information environment.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In crisis situations, this activity can produce strategic effects. Numerous low-impact incidents can consume defensive resources, complicate attribution, and obscure more sophisticated intrusions occurring simultaneously. Hacktivist campaigns may therefore function as distractions, signals, or psychological pressure while more capable actors pursue quieter access to high-value networks. For this reason, the analytical distinction between advanced persistent threat (APT) activity and hacktivism can become blurred during periods of geopolitical confrontation.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Several collectives active in the current environment publicly position themselves as ideologically aligned with Iran or with members of the so-called “Axis of Resistance.” Among the more visible groups are Handala Hack Team, Dienet, FAD Team, APT IRAN, Cyber Islamic Resistance, and Fatimion cyber team.</span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>These actors frequently frame their operations as retaliatory cyber campaigns targeting Israeli, Western, or allied regional entities, claiming responsibility for activities such as website defacements, DDoS attacks, and hack-and-leak operations targeting mainly government, telecommunications, energy, and financial entities. Although many claims remain difficult to verify independently, their messaging strategy often emphasizes their psychological and reputational impact.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In parallel, several pro-Russia hacktivist groups have also engaged in operations linked to the confrontation, including NoName057(16), Sever Killer, and Russian Legion. These groups typically conduct large-scale DDoS campaigns targeting government portals, financial services, and transportation or telecommunications infrastructure in states perceived as supporting Israel or broader Western policy positions. Their participation illustrates how regional conflicts can attract cyber actors from outside the immediate theater when ideological alignment or strategic narratives converge.</span></p><h2>Cyber activities linked to the ongoing conflict</h2><h3>Iranian APT group operations </h3><p style="direction: ltr;"><span style='font-size: undefined;'>Beyond the highly visible hacktivist activity circulating on social media, defacement platforms, and Telegram channels, a quieter but more strategically significant layer of cyber operations is unfolding through Iranian state-linked APT groups. These operations appear ongoing and aligned with broader geopolitical objectives tied to the current conflict environment.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Recent threat reporting indicates continued operations by the Iranian APT group, MuddyWater, which is widely assessed to be linked to MOIS. Since at least early February 2026, reporting has suggested potential compromises or attempted intrusions targeting organizations associated with the United States and allied interests. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>According to public reporting, activity linked to the group was reportedly observed within the networks of a United States–based bank, a United States airport, a nonprofit organization operating across the United States and Canada, and a software company with operations in Israel. In several of these incidents, threat actors reportedly deployed a previously undocumented backdoor</span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>known as Dindoor, suggesting a coordinated, ongoing campaign rather than isolated compromise events.</span></p><h3>Hacktivist and proxy disruption activities</h3><p style="direction: ltr;"><span style='font-size: undefined;'>The most visible form of cyber activity so far remains hacktivist and proxy-led disruption.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>DDoS attacks</strong></span><span style='font-size: undefined;'> are among the most common tactics employed by hacktivist groups. Pro-Russia groups such as NoName057(16) and Server Killers, along with other pro-Iran collectives affiliated with them, have been linked to waves of coordinated DDoS attacks against Israel, Qatar, Bahrain, and other politically symbolic targets. These attacks are generally inexpensive and cause only short-term technical damage, but they remain strategically useful because they disrupt public services, tie up defense resources, generate media coverage, and fuel the narrative of a sustained cyber response.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3849bbd3232ef3d1/69b1a5a0918e017d49408f6d/Telegram-Russian-hacktivist-targets-Israeli-website.png" alt="Telegram-Russian-hacktivist-targets-Israeli-website.png" caption="Figure 1: Telegram post from pro-Russia hacktivist groups claiming responsibility for targeting an Israeli website in support of Iran" height="721" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Telegram-Russian-hacktivist-targets-Israeli-website.png" width="861" max-width="861" max-height="721" style="max-width: 861px; width: 861px; max-height: 721px; height: 721px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3849bbd3232ef3d1/69b1a5a0918e017d49408f6d/Telegram-Russian-hacktivist-targets-Israeli-website.png" data-sys-asset-uid="blt3849bbd3232ef3d1" data-sys-asset-filename="Telegram-Russian-hacktivist-targets-Israeli-website.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 1: Telegram post from pro-Russia hacktivist groups claiming responsibility for targeting an Israeli website in support of Iran" data-sys-asset-alt="Telegram-Russian-hacktivist-targets-Israeli-website.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 1: Telegram post from pro-Russia hacktivist groups claiming responsibility for targeting an Israeli website in support of Iran</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Website defacement</strong></span><span style='font-size: undefined;'> also remains a common tactic. Groups such as FAD Team, 313, and Cyber Islamic Resistance have been associated with claims of attacks on several websites. Although defacements are technically simple to execute, they remain analytically significant: They are highly visible, rapidly disseminated, and psychologically impactful, often creating an exaggerated perception of widespread systemic compromise.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Data breaches </strong></span><span style='font-size: undefined;'>represent a far more significant dimension of cyber operations. The Iranian-aligned group Handala, in particular, continues to blend political messaging with claims of data theft and the selective release of allegedly compromised information. The group recently asserted that it had infiltrated a Saudi energy company and exfiltrated internal documents, framing the operation as a combination of data exfiltration, coercive pressure, and psychological warfare targeting the energy sector. Even when the full authenticity of released datasets cannot be independently verified, the publication of partially credible material can still generate substantial reputational damage and potential operational disruption for affected organizations.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Targeting critical infrastructure </strong></span><span style='font-size: undefined;'>has emerged as one of the most concerning aspects of the current cyber activity by pro-Iran hacktivists and proxy collectives. Groups operating in this ecosystem, including Iranian APTs, Handala, and networks associated with the Cyber Islamic Resistance umbrella, have publicly claimed operations targeting infrastructure across the region. Recent Telegram posts indicate that an Iranian APT group claimed responsibility for attempts to sabotage Jordanian critical infrastructure, while other Iran-aligned hacktivist personas have asserted access to sectors including fuel systems, water utilities, and other operational technology environments.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In a separate case, the Handala Hack Team has alleged that it compromised both Oil and gas companies in the United Arab Emirates and Israel, claiming to have exfiltrated more than 1.3 TB of sensitive data from oil and gas sector networks. These claims, which would represent a significant intrusion into Middle Eastern energy infrastructure if confirmed, have circulated primarily through hacktivist communication channels and social media reporting and have not been independently verified.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt20f0fba8f321d53d/69b1a5f58bb88ffba75a5246/Iran-APT-group-claims-targeting-Jordanian-critical-infrastructure.png" alt="Iran-APT-group-claims-targeting-Jordanian-critical-infrastructure.png" caption="Figure 2: IRAN APT group claimed attempts to target Jordanian critical infrastructure" height="702" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Iran-APT-group-claims-targeting-Jordanian-critical-infrastructure.png" width="424" max-width="424" max-height="702" style="max-width: 424px; width: 424px; max-height: 702px; height: 702px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt20f0fba8f321d53d/69b1a5f58bb88ffba75a5246/Iran-APT-group-claims-targeting-Jordanian-critical-infrastructure.png" data-sys-asset-uid="blt20f0fba8f321d53d" data-sys-asset-filename="Iran-APT-group-claims-targeting-Jordanian-critical-infrastructure.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 2: IRAN APT group claimed attempts to target Jordanian critical infrastructure" data-sys-asset-alt="Iran-APT-group-claims-targeting-Jordanian-critical-infrastructure.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 2: IRAN APT group claimed attempts to target Jordanian critical infrastructure</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Although many of these claims remain difficult to independently verify, the recurring focus on industrial control systems and essential services is analytically significant. Hacktivist collectives aligned with Iranian geopolitical narratives frequently leverage infrastructure-related claims as part of information operations designed to amplify perceived impact, generate psychological pressure, and signal the potential for escalation into operational technology environments. Even when technical disruption is limited or exaggerated, the persistent narrative around infrastructure compromise can shape defensive priorities and highlight potential escalation pathways within the broader cyber conflict.</span></p><h2>Sectoral exposure and risk landscape</h2><p style="direction: ltr;"><span style='font-size: undefined;'>In the current geopolitical context, cyberattacks extend far beyond military networks and defense institutions. Modern cyber operations increasingly aim to affect the broader ecosystem that supports government activity, economic stability, and public trust. Consequently, adversaries seek not only technically vulnerable targets but also organizations whose compromise or disruption can increase visibility, influence public perception, or create cascading effects across interconnected systems.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>A successful intrusion into a widely used service provider, a major infrastructure operator, or a publicly accessible institution can quickly produce consequences that extend far beyond the initial target, affecting supply chains, service availability, and public confidence. In this context, cyber operations often serve multiple purposes simultaneously: intelligence gathering, strategic positioning within critical networks, and generating disruption or exerting influence during periods of heightened geopolitical tension.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>At present, several sectors appear particularly exposed:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Government institutions and public administration</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Defense and aerospace industry</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Energy sector, including oil, gas, and electricity</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Telecommunications providers</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Financial services</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Transportation systems</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>However, the risk landscape extends beyond these sectors themselves. Organizations that form part of the broader digital supply chain supporting these industries may also represent attractive entry points. This includes cloud service providers, managed service providers, technology vendors, and other third-party platforms that maintain privileged access to client environments. Compromising such intermediaries can allow adversaries to reach high-value targets indirectly. By gaining access to a supplier or service provider, attackers may obtain pathways into multiple networks simultaneously, access sensitive information, or move laterally across interconnected operational systems. Supply chain compromise, therefore, offers both scale and stealth, making it an increasingly common tactic in sophisticated cyber campaigns.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Geopolitical alignment can also influence targeting decisions. Organizations based in countries that host United States military assets or are publicly aligned with United States or Israeli policy positions may attract additional attention from adversaries. In these cases, targeting can carry symbolic, political, or strategic value beyond the immediate technical impact of the intrusion. Within this environment, cyber exposure can generally be understood through three overlapping targeting dynamics.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Symbolic targets</strong></span><span style='font-size: undefined;'> include municipalities, universities, media outlets, and public institutions. These organizations may be targeted primarily for visibility, messaging, or propaganda purposes. Even limited disruption or data exposure can generate headlines and amplify the perceived reach of the attackers.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Operational targets</strong></span><span style='font-size: undefined;'> include sectors that support everyday economic and social activity, such as telecommunications providers, transportation systems, payment networks, and fuel distribution infrastructure. Disruptions in these areas can quickly affect daily life, creating public anxiety and increasing pressure on authorities to respond.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Strategic targets</strong></span><span style='font-size: undefined;'> consist of entities whose compromise offers long-term intelligence or operational value. This category includes defense contractors, major financial institutions, government networks, and operators of critical infrastructure. In these cases, adversaries may prioritize persistence and stealth to collect intelligence, monitor decision-making processes, or maintain access that could be leveraged during future crises.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Taken together, these targeting patterns illustrate a broader shift in cyber operations: Attackers are increasingly selecting targets not only for their intrinsic value, but for the broader political, economic, and societal effects that disruption or compromise can produce.</span></p><h2>What should organizations monitor?</h2><p style="direction: ltr;"><span style='font-size: undefined;'>In the current phase of the conflict, organizations should continue to monitor for indicators that activity is shifting from opportunistic disruption toward deliberate intrusion or access preparation.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Internet-facing infrastructure is often the initial entry point. Elevated scanning or probing of public websites, VPN gateways, remote access portals, cloud services, and email authentication infrastructure may indicate early reconnaissance. While some scanning is routine, sudden increases in probing activity or authentication attempts should be treated as potential precursors to intrusion.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Phishing and social engineering campaigns are also likely to intensify. Threat actors may exploit developments in the conflict by using lures that reference civil defense alerts, battlefield updates, humanitarian messaging, or urgent requests that appear to originate from leadership or trusted partners. In some cases, malicious applications or replicas of legitimate services may be used to harvest credentials or deploy malware.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Credential misuse remains a primary access vector. Security teams should monitor for abnormal authentication patterns, including logins from unusual geographic locations, access at unexpected hours, repeated failed logins followed by success, changes to multi-factor authentication settings, or the creation of new privileged accounts.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Organizations operating</span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>critical infrastructure should closely monitor activities within their operational environments. Suspicious access to remote management platforms, unusual connectivity between IT and OT networks, or unexpected activity involving engineering workstations or vendor access channels may signal reconnaissance within sensitive systems.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Finally, monitoring the broader information environment can provide early warning and signal the need to increase monitoring. Hacktivist groups frequently use platforms such as Telegram and X to circulate target lists, claim attacks, or release fragments of allegedly stolen data tied to geopolitical events. Tracking these channels can help organizations identify potential targets and strengthen their defensive posture before malicious activity reaches their networks.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><em>Additional reading from Rapid7 Labs, for Rapid7 customers: </em></span><a href="/blog/post/tr-detection-coverage-iran-linked-cyber-activity/" target="_self"><span style='font-size: undefined;'><em><strong>Rapid7 Detection Coverage for Iran-Linked Cyber Activity</strong></em></span></a></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-iran-cyber-playbook-escalating-regional-conflict</link>
      <guid isPermaLink="false">blt0a98a86ba378c63c</guid>
      <category><![CDATA[Hacking]]></category>
      <category><![CDATA[Threat Intel]]></category>
      <category><![CDATA[Government]]></category><dc:creator><![CDATA[Rapid7 Labs]]></dc:creator>
      <pubDate>Wed, 11 Mar 2026 17:30:58 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt62de3c632e7d1ef7/6984a555a6b5ef052cb93196/Chrysalis-backdoor-blog.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[From Policy to Practice: Why Cyber Resilience Needs a Reboot]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>In cybersecurity today, regulation is everywhere, but resilience isn’t keeping pace.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In </span><a href="https://youtu.be/rRDBCI_a_kg" target="_blank"><span style='font-size: undefined;'>this episode</span></a><span style='font-size: undefined;'> of </span><span style='font-size: undefined;'><em>Experts on Experts: Commanding Perspectives</em></span><span style='font-size: undefined;'>, Craig Adams chats with Sabeen Malik, VP of Public Policy & Government Affairs at Rapid7, about what’s broken (and what’s promising) in today’s regulatory landscape.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Sabeen pulls from her experience across diplomacy, operations, and government relations to highlight where policy too often fails to account for how risk actually works. From insider threats to government shutdowns, it’s a sharp, timely look at how security leaders should approach strategy, structure, and compliance going into 2026.</span></p><h2><span style='font-size: undefined;'>Key themes:</span></h2><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>The growing trust gap between public, private, and institutional actors</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Why insider threats are a cultural problem, not just a controls one</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Where UK and US guidance is falling short on resilience</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>What small and midsized businesses are still missing</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Why AI, exposure, and threat governance need to be connected</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Whether you're thinking about AI use cases or modern regulation fatigue, this episode offers a much-needed reset.</span></p><p><span style='font-size: undefined;'>Watch the full video below:</span></p><p>⠀</p>]]></description>
      <link>https://www.rapid7.com/blog/post/it-policy-to-practice-cyber-resilience-needs-reboot-experts</link>
      <guid isPermaLink="false">blt89468e3c004bcfef</guid>
      <category><![CDATA[Public Policy]]></category>
      <category><![CDATA[Government]]></category>
      <category><![CDATA[Artificial Intelligence]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Thu, 04 Dec 2025 14:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf8317b2e5bfec732/68adbeaa4f9d3d04bd8228e9/experts-on-experts.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Salt Typhoon APT Group: What Public Sector Leaders and Defenders Should Know]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>The </span><a href="https://www.rapid7.com/research/report/salt-typhoon-apt-china-mss/" target="_self"><span style='font-size: undefined;'><em>Rapid7 Threat Focus: Salt Typhoon</em></span><span style='font-size: undefined;'> report</span></a><span style='font-size: undefined;'> profiles one of the most sophisticated and persistent state-sponsored threat actors operating today. Salt Typhoon, a Chinese espionage advanced persistent threat (APT) group linked to the Ministry of State Security (MSS), has spent years infiltrating global telecommunications and government networks, including U.S. infrastructure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For federal, state, and local agencies, the Salt Typhoon campaign underscores an uncomfortable truth: Persistent nation-state threats are no longer limited to federal intelligence targets. They are probing every layer of U.S. governance – from military networks to state communications systems and the vendors that support them.</span></p><h2 style="direction: ltr;">Why Salt Typhoon matters to the public sector</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Salt Typhoon isn’t just another advanced persistent threat. It represents a deliberate, long-term effort to establish access across networks that form the backbone of U.S. government operations. According to the report, the group has compromised at least eight major U.S. telecom carriers and a state Army National Guard network. As much as espionage, this type of activity suggests pre-positioning for disruption.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This “sleeper agent” approach means the adversary is already inside and quietly gathering intelligence, mapping networks, and waiting for the right moment to act. The lesson for the public sector is clear: Protecting sensitive data and systems can’t stop at the perimeter. Defenders </span><span style='font-size: undefined;'><em>must assume compromise</em></span><span style='font-size: undefined;'> and proactively design systems for containment, resilience, and recovery.</span></p><h2 style="direction: ltr;">Key takeaways from the threat report</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The </span><a href="https://www.rapid7.com/research/report/salt-typhoon-apt-china-mss/" target="_blank"><span style='font-size: undefined;'>Salt Typhoon threat report</span></a><span style='font-size: undefined;'> highlights several themes with direct implications for public sector security teams:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Espionage with operational intent:</strong></span><span style='font-size: undefined;'> While data theft is the primary goal, the group’s sustained presence in military and telecom environments points to potential for sabotage in a crisis scenario.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Supply chain and partner risk:</strong></span><span style='font-size: undefined;'> Many intrusions began not with direct government access but through compromised service providers, contractors, and telecom vendors.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Deep persistence and stealth:</strong></span><span style='font-size: undefined;'> The actor’s toolkit – including the Demodex rootkit and backdoors such as SparrowDoor and GhostSpider – allows it to maintain hidden access for years.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Global reach, local impact:</strong></span><span style='font-size: undefined;'> Though Salt Typhoon targets critical infrastructure worldwide, the U.S. remains its primary focus. Federal, state, and local entities must consider themselves part of that target set.</span></p></li></ul><h2 style="direction: ltr;">Top 5 defensive priorities for agencies</h2><h3 style="direction: ltr;">Adopt a zero trust mindset</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Assume compromise. Every connection, device, and user must be continuously verified. Critical systems such as emergency communications, intelligence databases, or public safety platforms should be isolated so that no single intrusion can grant broad access. Network segmentation and strict identity controls are essential, even for internal traffic.</span></p><h3 style="direction: ltr;">Tighten patch and vulnerability management</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Salt Typhoon frequently exploits known vulnerabilities in VPNs, firewalls, and email servers. Agencies should prioritize high-impact systems for accelerated patching and adopt continuous vulnerability scanning. Rapid7 research found that even short delays in patch cycles can leave agencies exposed to exploitation windows measured in days, not weeks.</span></p><h3 style="direction: ltr;">Strengthen identity and credential hygiene</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Nearly every Salt Typhoon campaign leveraged stolen credentials. Federal and state agencies should enforce multi-factor authentication (MFA) universally, deploy privileged access management (PAM) tools, and routinely audit accounts for privilege creep. Temporary credentials, monitored admin sessions, and “no standing privileges” policies help prevent escalation.</span></p><h3 style="direction: ltr;">Enhance detection with extended visibility</h3><p style="direction: ltr;"><span style='font-size: undefined;'>The group’s hallmark is stealth. Agencies should deploy endpoint detection and response (EDR) or extended detection and response (XDR) solutions that can flag subtle behaviors such as lateral movement through tools like PsExec and WMIC. Continuous monitoring of outbound traffic – particularly encrypted HTTPS and DNS channels – is vital to spotting command-and-control (C2) communications.</span></p><h3 style="direction: ltr;">Build resilience through collaboration</h3><p style="direction: ltr;"><span style='font-size: undefined;'>No single organization can manage this threat alone. Information sharing between agencies and trusted partners remains critical. Early sharing of indicators and tactics can expose coordinated campaigns faster and improve sector-wide readiness.</span></p><h2 style="direction: ltr;">What this means for the public sector</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Salt Typhoon’s long-term infiltration strategy is a reminder that modern cyber defense is as much about proactive endurance as innovation. For every exploit patched and alert investigated, these adversaries persist. However, the cost of a breach could be astronomical compared to the cost of a solution like Rapid7’s vulnerability management (VM) capabilities that can help quickly prioritize the vulnerabilities most critical for remediation.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This means federal workers can more effectively meet the demanding requirements of mandates like those in the new executive order. Both </span><span style='font-size: undefined;'>Rapid7's VM and cloud security capabilities provide the continuous monitoring required for maintaining a strong security posture.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Both federal and state defenders should emphasize proactive threat hunting and cross-sector coordination. Those working specifically in the state, local, and educational (SLED) sector as well as non-criminal justice agencies (NCJAs), however, are becoming more frequent targets due to compliance-related issues. This can be attributed to several factors:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Government agencies are considered an easy target by malicious actors.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Small local agencies may inadvertently provide malicious actors with a portal into sensitive data in </span>Criminal Justice Information Services (CJIS)<span style='font-size: undefined;'> databases.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Law enforcement and public safety agencies – as well as their third-party vendors – are increasingly using unauthorized mobile devices to transmit and store CJIS data.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>To underscore all of the above, state and local governments are typically less secure and less funded than their federal counterparts. However, a solution like Rapid7’s automated workflow capabilities can provide the AI-powered automation needed to streamline security operations and enforce compliance standards across hybrid cloud environments.  </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The message is simple-yet-urgent: Long before conflict begins, sophisticated espionage campaigns attempt to shape the digital battlefield to the advantage of threat actors. Whether you manage a state network, a fusion center, or a federal communications platform, the same principles apply: visibility, verification, and vigilance.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Stay ahead of adversaries who plan years ahead.</strong></span><span style='font-size: undefined;'> Read the full Rapid7 </span><a href="https://www.rapid7.com/research/report/salt-typhoon-apt-china-mss/"><span style='font-size: undefined;'>Threat Focus: Salt Typhoon</span></a><span style='font-size: undefined;'> report to understand how your agency can safeguard and strengthen the defenses of critical systems that keep the United States running.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-salt-typhoon-apt-public-sector-leaders-and-defenders</link>
      <guid isPermaLink="false">blt4a31484158981438</guid>
      <category><![CDATA[Government]]></category>
      <category><![CDATA[Compliance]]></category>
      <category><![CDATA[Research]]></category><dc:creator><![CDATA[Rapid7 Labs]]></dc:creator>
      <pubDate>Thu, 30 Oct 2025 15:36:02 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt337f64bf565e9a4f/69038a3c062b4c6b2811acf1/Blog-hero-threat-focus-salt-typhoon.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Microsoft SharePoint Zero-Day Exploitation: What Public Sector Leaders Should Know]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>The </span><a href="https://www.rapid7.com/research/report/cve-2025-53770/" target="_blank"><span style='font-size: undefined;'>Rapid7 September 2025 Threat Report</span></a><span style='font-size: undefined;'> highlights active exploitation of a critical Microsoft SharePoint vulnerability, CVE-2025-53770. This </span><a href="/fundamentals/zero-day-attack/" target="_self"><span style='font-size: undefined;'>zero-day attack</span></a><span style='font-size: undefined;'> is being used by threat actors to gain initial access to victim networks, with exploitation observed in government as well as multiple other industries.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>SharePoint remains a widely deployed collaboration platform in federal, state, and local agencies, resulting in the need for urgent attention among public sector organizations. The combination of its ubiquity and sensitive data handling makes it a prime target. </span><a href="https://federalnewsnetwork.com/cybersecurity/2025/07/agencies-face-tight-deadline-to-mitigate-sharepoint-vulnerability/#:~:text=Agencies%20had%20to%20scramble%20over,SharePoint%20vulnerability%20in%20its%20alert" target="_blank"><span style='font-size: undefined;'>Recent reporting</span></a><span style='font-size: undefined;'> shows attackers are moving fast to take advantage of this flaw, and many agencies faced tight deadlines this summer to apply mitigations under federal directives.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This isn’t the first time SharePoint has been targeted. Earlier this year, </span><a href="https://www.rapid7.com/blog/post/etr-zero-day-exploitation-of-microsoft-sharepoint-servers-cve-2025-53770/" target="_blank"><span style='font-size: undefined;'>we analyzed</span></a><span style='font-size: undefined;'> this exploitation in depth in a previous blog. The September threat report now confirms that nefarious activity has accelerated, with attackers demonstrating a high level of interest in leveraging this vector against both commercial and government entities.</span></p><h2 style="direction: ltr;">Why public sector agencies should pay close attention</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Government systems are uniquely attractive targets. Agencies hold sensitive citizen data, manage critical infrastructure, and often operate under resource constraints that slow down patching cycles. SharePoint’s integration across agencies makes it a high-value target: Compromise of a single system can quickly escalate into broader access.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>According to </span><a href="https://federalnewsnetwork.com/cybersecurity/2025/07/agencies-face-tight-deadline-to-mitigate-sharepoint-vulnerability/#:~:text=Agencies%20had%20to%20scramble%20over,SharePoint%20vulnerability%20in%20its%20alert"><span style='font-size: undefined;'>reporting</span></a><span style='font-size: undefined;'>, agencies had to scramble this summer to meet remediation deadlines set by the Cybersecurity and Infrastructure Security Agency (CISA). For state and local organizations without the same centralized directives, the challenge is even greater as many remain vulnerable while attackers continue to scan and exploit exposed SharePoint servers globally. Cumulatively, we know that:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploitation is ongoing.</strong></span><span style='font-size: undefined;'> Threat actors continue to weaponize the vulnerability, with automated scanning campaigns followed by hands-on-keyboard activity once they gain access.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Targets are broad.</strong></span><span style='font-size: undefined;'> Government, education, and healthcare organizations are among those most at risk due to widespread SharePoint use.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Post-exploitation tactics are consistent.</strong></span><span style='font-size: undefined;'> Attackers are using the foothold to deploy web shells, move laterally, and harvest credentials, setting the stage for ransomware or data theft.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>These key takeaways reinforce the urgency for public sector defenders to validate their exposure and strengthen monitoring.</span></p><h2 style="direction: ltr;">Steps agencies can take now</h2><p style="direction: ltr;"><span style='font-size: undefined;'>To reduce risk and build resilience against SharePoint exploitation, public sector security teams should prioritize the following.</span></p><ol><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Patch or mitigate immediately.</strong></span><span style='font-size: undefined;'> If you haven’t yet applied Microsoft’s security update for CVE-2025-53770, this is your top priority. For systems that cannot be patched quickly, apply CISA’s published workarounds.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Validate exposure.</strong></span><span style='font-size: undefined;'> Use exposure management practices to confirm which systems are internet-facing and whether compensating controls are in place – visibility into your true attack surface is absolutely critical.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Hunt for signs of compromise.</strong></span><span style='font-size: undefined;'> Review logs for unusual authentication attempts, web shell activity, or anomalous SharePoint process behavior. Rapid7 managed detection and response (MDR) customers benefit from proactive threat hunts that specifically look for exploitation indicators in environments like SharePoint.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Strengthen detection and response.</strong></span><span style='font-size: undefined;'> Public sector agencies often lack 24/7 monitoring resources. MDR services can act as a force multiplier, helping agencies contain threats before they escalate.</span></p></li></ol><h2 style="direction: ltr;">Looking ahead</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Attackers are opportunistic – as long as SharePoint remains essential to public sector collaboration, it will remain a target. By applying patches quickly, validating exposures, and investing in continuous detection, agencies can reduce the likelihood that a SharePoint compromise becomes a larger breach.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The threat report provides a deeper dive into the tactics we’re observing and recommendations for defense. For public sector leaders, this is a chance to take stock of current defenses, pressure-test monitoring, and ensure that your agency is positioned to withstand active exploitation campaigns.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Stay ahead of these threats. </strong></span><span style='font-size: undefined;'>Read the full</span><span style='font-size: undefined;'><strong> </strong></span><a href="https://www.rapid7.com/research/report/cve-2025-53770/" target="_blank"><span style='font-size: undefined;'>Rapid7 September 2025 Threat Report</span></a><span style='font-size: undefined;'> for a complete analysis and practical guidance.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-microsoft-sharepoint-zero-day-exploitation-what-public-sector-leaders-should-know</link>
      <guid isPermaLink="false">blt6c712d120aef626b</guid>
      <category><![CDATA[Government]]></category>
      <category><![CDATA[Compliance]]></category>
      <category><![CDATA[Research]]></category>
      <category><![CDATA[Labs]]></category><dc:creator><![CDATA[Rapid7 Labs]]></dc:creator>
      <pubDate>Tue, 30 Sep 2025 13:15:08 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltbd362363aef84692/68dbd8a89cad22fae72803e0/Blog-card-FedRamp-report-Sept-2025.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Rapid7 Is Now FedRAMP Authorized: What It Means for Federal Agencies and the Organizations that Support them]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>We’re proud </span><a href="https://www.rapid7.com/about/press-releases/rapid7-achieves-fedramp-authorization-for-insightgovcloud-platform" target="_self"><span style='font-size: undefined;'>to announce</span></a><span style='font-size: undefined;'> that </span><a href="https://www.rapid7.com/solutions/compliance/fedramp/" target="_self"><span style='font-size: undefined;'><strong>Rapid7’s InsightGovCloud Platform</strong></span></a><span style='font-size: undefined;'><strong> has achieved FedRAMP® Moderate Authorization</strong></span><span style='font-size: undefined;'>, a major milestone that signals our continued commitment to helping federal agencies embrace the cloud securely. This authorization opens new doors for Rapid7 to work more closely with public sector partners and reinforces our mission to simplify and strengthen cybersecurity across the most sensitive and complex environments.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>But what does this really mean for your agency? Let’s dig deeper.</span></p><h2><span style='font-size: undefined;'>Understanding FedRAMP authorization and why it matters</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>FedRAMP (Federal Risk and Authorization Management Program) is the gold standard for assessing and authorizing cloud service providers that work with the U.S. government. Receiving this designation means Rapid7 has met the federal government’s most rigorous security, compliance, and risk management standards.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7’s FedRAMP Moderate Authorization means agencies can:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Accelerate ATO timelines</strong></span><span style='font-size: undefined;'> using an authorized, vetted platform</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Align with NIST 800-53, CMMC, and TIC 3.0</strong></span><span style='font-size: undefined;'> with built-in compliance support</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Operate confidently</strong></span><span style='font-size: undefined;'> in hybrid, cloud, or containerized environments with a platform that meets federal security requirements out of the box</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>From procurement to deployment, InsightGovCloud reduces friction, increases trust, and enables teams to act faster.</span></p><h2><span style='font-size: undefined;'>InsightGovCloud: a unified platform purpose-built for the public sector</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>The InsightGovCloud Platform brings together multiple capabilities within a unified FedRAMP-authorized environment:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>InsightVM:</strong></span><span style='font-size: undefined;'> A comprehensive vulnerability management tool offering deep asset visibility, risk-based prioritization, and automated remediation workflows.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>InsightCloudSec:</strong></span><span style='font-size: undefined;'> Enables continuous posture management, real-time visibility, and misconfiguration detection across multi-cloud and Kubernetes environments.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>InsightConnect: </strong></span><span style='font-size: undefined;'>A security orchestration, automation, and response (SOAR) platform that speeds up detection and response across hybrid cloud and on-prem systems.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>And with the Insight Agent now running in FIPS-compliant mode and hosted in a U.S.-based cloud, federal teams can ensure end-to-end compliance with confidence.</span></p><h2><span style='font-size: undefined;'>Solving real-world challenges for federal agencies</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Modern federal networks are a mix of legacy infrastructure, sprawling cloud assets, and sensitive data. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Here’s how Rapid7 helps to address this complex reality:</span></p><ul><li><span style='font-size: undefined;'><strong>Vulnerability management for legacy & cloud</strong></span><strong>:</strong> <span style='font-size: undefined;'>Unify vulnerability detection and remediation across physical, virtual, and cloud assets. Whether agentless or agent-based, no asset is left unmonitored.</span></li><li><span style='font-size: undefined;'><strong>Risk-aware prioritization that scales</strong></span><strong>:</strong> <span style='font-size: undefined;'>InsightVM goes beyond CVE counts. Active Risk scoring factors in exploitability, real-world intel, and business context — empowering security teams to focus on what matters most.</span></li><li><strong>Cloud-native posture & exposure management: </strong><span style='font-size: undefined;'>InsightCloudSec offers unparalleled support for multi-cloud and containerized environments. Gain instant visibility, enforce policies, and drive compliance in real time.</span></li><li><strong>Automated detection & response: </strong><span style='font-size: undefined;'>With InsightConnect, you can automate response across your toolchain — reducing investigation time and improving coordination across SOC, IT, and DevOps teams.</span></li><li><strong>Compliance with confidence:</strong> <span style='font-size: undefined;'>Support for frameworks including FedRAMP, NIST 800-53, CMMC, CIS Benchmarks, DISA STIGs, and more. Automate evidence collection, track progress, and simplify audits.</span></li></ul><h2>Why now?</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Threat actors are becoming more sophisticated, and the attack surface is growing faster than most teams can manage. The </span><a href="https://www.rapid7.com/research/report/2024-attack-intelligence-report/" target="_self"><span style='font-size: undefined;'>2024 Rapid7 Attack Intelligence Report</span></a><span style='font-size: undefined;'> found that 43% of exploited CVEs were zero-day vulnerabilities, and over half were exploited within a week of disclosure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Federal agencies can’t afford slow, siloed security tools. Whether you're modernizing for EO 14028 compliance, preparing for CMMC assessments, or tackling TIC 3.0 mandates, Rapid7 delivers the capability and clarity to move faster than your adversaries.</span></p><h2>Looking ahead</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Achieving FedRAMP Authorization is not just a badge, it’s a commitment to working with the public sector as a true partner. We look forward to building deeper collaborations with federal security teams, delivering the visibility, automation, and intelligence needed to protect government systems and the people they serve.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To learn more about Rapid7’s solutions for the public sector, visit our </span><a href="https://www.rapid7.com/solutions/industry/government/"><span style='font-size: undefined;'>Government Solutions page;</span></a><span style='font-size: undefined;'> for more FedRAMP specific information & resources, explore our </span><a href="https://www.rapid7.com/solutions/compliance/fedramp/" target="_self"><span style='font-size: undefined;'>FedRAMP compliance hub page</span></a><span style='font-size: undefined;'>.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/rapid7-is-now-fedramp-authorized-what-it-means-for-federal-agencies</link>
      <guid isPermaLink="false">blt10f8ff2fadfd9b26</guid>
      <category><![CDATA[Government]]></category>
      <category><![CDATA[Compliance]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Mon, 28 Jul 2025 15:48:02 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt09a532eac4a02570/6852c5968e72c44b89691ca4/PSN-gov-showcase-hero-image-2.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Rapid7 completes IRAP PROTECTED assessment for Insight Platform solutions]]></title>
      <description><![CDATA[<p>Exciting news from Australia!</p><p>Rapid7 has <a href="/about/press-releases/rapid7-completes-irap-protected-assessment/">successfully completed</a> an Information Security Registered Assessors Program (IRAP) assessment to PROTECTED Level for several of our Insight Platform solutions.</p><h2>What is IRAP?</h2><p>An IRAP assessment is an independent assessment of the implementation, appropriateness, and effectiveness of a system’s security controls. Achieving IRAP PROTECTED status means Australian Government agencies requiring PROTECTED level controls can access our industry-leading, practitioner-first security solutions. Meeting this status further strengthens our position as a trusted partner for Australian government organizations seeking to enhance their cybersecurity posture.</p><p>Rapid7 is one of the only vendors to be IRAP-assessed across what we consider a consolidated cybersecurity operation. This places us in a unique position to supply services across federal, state, and local government in Australia. It provides our government customers with the confidence that we have the right governance and controls in place for our own business in order to deliver that service effectively for our customers, specifically covering:</p><ul><li>Vulnerability management on traditional infrastructure</li><li>Endpoints</li><li>The secure implementation of web applications</li><li>Detection and response to alerts or threats</li><li>The ability to securely automate workflows</li></ul><h2>Why is being IRAP PROTECTED important?</h2><p>Being IRAP-assessed demonstrates our commitment to providing secure and reliable information security services for Government Systems, Cloud Service Providers, Cloud Services, and Information and Communications Technology (ICT) Systems, and more widely to our Australian customers.</p><p>Importantly, it highlights how we take the <a href="/fundamentals/shared-responsibility-model/">shared responsibility model</a> extremely seriously. It also shows we’re protecting our customers’ information and data across their traditional infrastructure and in the cloud.</p><h2>Which solutions are approved?</h2><p>Solutions assessed and approved for PROTECTED Level include InsightIDR (detection and response), InsightVM (vulnerability management), InsightAppSec (application security), and InsightConnect (orchestration and automation). These solutions provide a comprehensive security platform to help government agencies tackle the challenges of today's evolving cybersecurity landscape.</p><p>The successful completion of the IRAP assessment at the PROTECTED level demonstrates our commitment to supporting Australian government customers. It means they have access to a comprehensive security platform necessary to tackle the ever-evolving challenges of today's cybersecurity landscape.</p><p>As more government agencies migrate to hybrid cloud environments, we can help them better manage the growing complexity of identifying and securing the <a href="/fundamentals/attack-surface/">attack surface</a>.</p><p>As attackers become increasingly sophisticated, better armed, and faster, the IRAP assessment is yet another string in our cybersecurity bow, showcasing our potential to support Australian Government agencies and more widely, our customers.</p><div><h4>NEVER MISS AN EMERGING THREAT</h4><p>Be the first to learn about the latest vulnerabilities and cybersecurity news.</p><a href="#">Subscribe Now</a></div>]]></description>
      <link>https://www.rapid7.com/blog/post/2024/07/08/rapid7-completes-irap-protected-assessment-for-insight-platform-solutions</link>
      <guid isPermaLink="false">blt2e2a38527786eb8a</guid>
      <category><![CDATA[Government]]></category>
      <category><![CDATA[InsightIDR]]></category>
      <category><![CDATA[InsightAppSec]]></category>
      <category><![CDATA[InsightVM]]></category>
      <category><![CDATA[InsightConnect]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Mon, 08 Jul 2024 20:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1df4c8940e2baa63/683de77d3e68ee590a889bad/GettyImages-1448456737.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Rapid7 CEO Corey E. Thomas Appointed To National Security Telecommunications Advisory Committee]]></title>
      <description><![CDATA[<p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/02/03/president-biden-announces-appointments-to-national-security-telecommunications-advisory-committee/">President Biden has announced</a> his intent to appoint a group of highly qualified and diverse industry leaders, including <a href="/about/leadership/">Rapid7 chairman & CEO Corey E. Thomas</a>, to the President’s National Security Telecommunications Advisory Committee (<a href="https://www.cisa.gov/nstac">NSTAC</a>). </p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt77297435615a5a58/683ddf5470aa95407bfe3016/1675700581931-2.jpeg" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="1675700581931-2.jpeg" asset-alt="1675700581931-2.jpeg" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt77297435615a5a58/683ddf5470aa95407bfe3016/1675700581931-2.jpeg" data-sys-asset-uid="blt77297435615a5a58" data-sys-asset-filename="1675700581931-2.jpeg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-alt="1675700581931-2.jpeg" sys-style-type="display"/></figure><p></p><p>NSTAC’s mission is to to provide the best possible technical information and policy advice to assist the President and other stakeholders responsible for critical national security and emergency preparedness (NS/EP) services. The committee advises the White House on the reliability, security, and preparedness of vital communications and information infrastructure. It is focused on five key themes:</p><ul><li>Strengthening national security</li><li>Enhancing cybersecurity</li><li>Maintaining the global communications infrastructure</li><li>Assuring communications for disaster response</li><li>Addressing critical infrastructure interdependencies and dependencies</li></ul><p>Thomas joins a talented group of telecommunications and security executives from companies such as AT&T, Microsoft, Cisco, Lockheed Martin, T-Mobile, and Verizon. These executives bring diverse perspectives backed by years of unique industry experience. </p><p>“It is an extreme honor and privilege to be named to the President’s National Security Telecommunications Advisory Committee,” said Thomas. “I look forward to the remarkable opportunity to provide <a href="/">cybersecurity</a> guidance to the President’s administration and to work alongside and learn from  this talented group of individuals, many of whom I’ve admired throughout my career.”</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2023/02/16/rapid7-ceo-corey-e-thomas-appointed-to-national-security-telecommunications-advisory-committee</link>
      <guid isPermaLink="false">bltf45389affc60f0bb</guid>
      <category><![CDATA[Government]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Thu, 16 Feb 2023 17:11:15 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt11608d27d6fa99d3/683ddf79aaf620d9d379de21/GettyImages-104240041-1.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Rapid7 Now Available Through Carahsoft’s NASPO ValuePoint]]></title>
      <description><![CDATA[<p>We are happy to announce that <a href="/products/">Rapid7’s cybersecurity products</a> have been added to the NASPO ValuePoint Cloud Solutions contract held by Carahsoft Technology Corp. The addition of this contract enables Carahsoft and its reseller partners to provide Rapid7’s Insight platform to participating States, Local Governments, and Educational (SLED) institutions.</p><p>“Rapid7’s Insight platform goes beyond threat detection by enabling organizations to quickly respond to attacks with intelligent automation,” said Alex Whitworth, Sales Director who leads the Rapid7 Team at Carahsoft. </p><p>“We are thrilled to work with Rapid7 and our reseller partners to deliver these advanced cloud risk management and threat detection solutions to NASPO members to further protect IT environments across the SLED space.”</p><p>NASPO ValuePoint is a cooperative purchasing program facilitating public procurement solicitations and agreements using a lead-state model. The program provides the highest standard of excellence in public cooperative contracting. By leveraging the leadership and expertise of all states and the purchasing power of their public entities, NASPO ValuePoint delivers the highest valued, reliable and competitively sourced contracts, offering public entities outstanding prices.</p><p>“In partnership with Carahsoft and their reseller partners, we look forward to providing broader availability of the Insight platform to help security teams better protect their organizations from an increasingly complex and volatile threat landscape,” said Damon Cabanillas, Vice President of Public Sector Sales at Rapid7. </p><p>The Rapid7 Insight platform is available through Carahsoft’s NASPO ValuePoint Master Agreement #AR2472. For more information, visit <a href="https://www.carahsoft.com/rapid7/contracts">https://www.carahsoft.com/rapid7/contracts</a>.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2023/01/24/rapid7-now-available-through-carahsofts-naspo-valuepoint</link>
      <guid isPermaLink="false">bltd7650fc3b6d63d8d</guid>
      <category><![CDATA[Government]]></category>
      <category><![CDATA[InsightIDR]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Tue, 24 Jan 2023 15:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Rapid7 Added to Carahsoft GSA Schedule Contract]]></title>
      <description><![CDATA[<p>We are happy to announce that Rapid7 has been added to Carahsoft’s GSA Schedule contract, making our suite of comprehensive security solutions widely available to Federal, State, and Local agencies through <a href="https://www.carahsoft.com/">Carahsoft</a> and its reseller partners. </p><p>“With the ever-evolving threat landscape, it is important that the public sector has the resources to defend against sophisticated cyber attacks and vulnerabilities,” said Alex Whitworth, Sales Director who leads the Rapid7 Team at Carahsoft. </p><p>“The addition of Rapid7’s cloud risk management and threat detection solutions to our GSA Schedule gives <a href="/solutions/industry/government/">Government</a> customers and our reseller partners expansive access to the tools necessary to protect their critical infrastructure.”</p><p>With the GSA contract award, Rapid7 is able to significantly expand its availability to Federal, State, Local, and Government markets. In addition to GSA, Rapid7 was <a href="/about/press-releases/rapid7-added-to-the-department-of-homeland-securitys--continuous-diagnostics-and-mitigation-programs-approved-products-list/">recently added</a> to the Department of Homeland Security (DHS) Continuous Diagnostics Mitigation’s Approved Products List.</p><p>“As the attack surface continues to increase in size and complexity, it’s imperative that all organizations have access to the tools and services they need to monitor risk across their environments,” said Damon Cabanillas, Vice President of Public Sector Sales at Rapid7. </p><p>“This contract award is a massive step forward for Rapid7 as we work to further serve the public sector.”</p><p>Rapid7 is available through Carahsoft’s GSA Schedule No. 47QSWA18D008F. For more information on Rapid7’s products and services, contact the Rapid7 team at Carahsoft at <a href="mailto:Rapid7@carahsoft.com">Rapid7@carahsoft.com</a>.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2023/01/24/rapid7-added-to-carahsoft-gsa-schedule-contract</link>
      <guid isPermaLink="false">blt239be37dd6992929</guid>
      <category><![CDATA[Risk Management]]></category>
      <category><![CDATA[Government]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Tue, 24 Jan 2023 15:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt8bb6839e2b6625c8/683ddc2b5619a136efc6e962/GettyImages-1216713090-1.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Incident Reporting Regulations Summary and Chart]]></title>
      <description><![CDATA[<p>A growing number of regulations require organizations to report significant cybersecurity incidents. <a href="/globalassets/_pdfs/Rapid7-Incident-Reporting-Regulation-Summary-Chart-080822.pdf">We've created a chart</a> that summarizes 11 proposed and current cyber incident reporting regulations and breaks down their common elements, such as who must report, what cyber incidents must be reported, the deadline for reporting, and more.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1910ac2e1baa6012/683de874abf2ada2623c4634/blog-image-Incident-Reporting.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="blog-image-Incident-Reporting.png" asset-alt="blog-image-Incident-Reporting.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1910ac2e1baa6012/683de874abf2ada2623c4634/blog-image-Incident-Reporting.png" data-sys-asset-uid="blt1910ac2e1baa6012" data-sys-asset-filename="blog-image-Incident-Reporting.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="blog-image-Incident-Reporting.png" sys-style-type="display"/></figure><p></p><p>This chart is intended as an educational tool to enhance the security community’s awareness of upcoming public policy actions, and provide a big picture look at how the incident reporting regulatory environment is unfolding. Please note, this chart is not comprehensive (there are even more incident reporting regulations out there!) and is only current as of August 8, 2022. Many of the regulations are subject to change. </p><p><em>This summary is for educational purposes only and nothing in this summary is intended as, or constitutes, legal advice. </em></p><p><a href="/blog/author/peter-woolverton/"><em>Peter Woolverton</em></a><em> led the research and initial drafting of this chart.</em></p><div><h4>NEVER MISS A BLOG</h4><p>Get the latest stories, expertise, and news about security today.</p><a href="#">Subscribe</a></div><br/><p><em><strong>Additional reading:</strong></em></p><ul><li><a href="/blog/post/2022/08/23/avoiding-smash-and-grab-under-the-secs-proposed-cyber-rule/"><em>Avoiding Smash and Grab Under the SEC’s Proposed Cyber Rule</em></a></li><li><a href="/blog/post/2022/08/10/navigating-the-evolving-patchwork-of-incident-reporting-requirements/"><em>Navigating the Evolving Patchwork of Incident Reporting Requirements</em></a></li><li><a href="/blog/post/2022/03/10/new-us-laws-to-require-cyber-incident-reports/"><em>New US Law to Require Cyber Incident Reports</em></a></li><li><a href="/blog/post/2022/01/26/how-ransomware-is-changing-us-federal-policy/"><em>How Ransomware Is Changing US Federal Policy</em></a><br/><br/></li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/2022/08/26/incident-reporting-regulations-summary-and-chart</link>
      <guid isPermaLink="false">blte9b3c1e576d321fb</guid>
      <category><![CDATA[Public Policy]]></category>
      <category><![CDATA[Incident Response]]></category>
      <category><![CDATA[Compliance]]></category>
      <category><![CDATA[Government]]></category><dc:creator><![CDATA[Harley Geiger]]></dc:creator>
      <pubDate>Fri, 26 Aug 2022 13:31:26 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1910ac2e1baa6012/683de874abf2ada2623c4634/blog-image-Incident-Reporting.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[An Inside Look at CISA’s Supply Chain Task Force]]></title>
      <description><![CDATA[<p>When one mentions supply chains these days, we tend to think of microchips from China causing delays in automobile manufacturing or toilet paper disappearing from store shelves. Sure, there are some chips in the communications infrastructure, but the cyber supply chain is mostly about virtual things – the ones you can’t actually touch.  </p><p>In 2018, the Cybersecurity and Infrastructure Security Agency (CISA) established the Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM) Task Force as a public-private joint effort to build partnerships and enhance ICT supply chain resilience. To date, the Task Force has worked on 7 Executive Orders from the White House that underscore the importance of supply chain resilience in <a href="/blog/post/2021/09/24/ransomware-is-critical-infrastructure-in-the-clear/">critical infrastructure</a>.</p><h2>Background</h2><p>The ICT-SCRM Task Force is made up of members from the following sectors:</p><ul><li><strong>Information Technology (IT)</strong> – Over 40 IT companies, including service providers, hardware, software, and cloud have provided input.</li><li><strong>Communications </strong>– Nearly 25 communications associations and companies are included, with representation from the wireline, wireless, broadband, and broadcast areas.</li><li><strong>Government </strong>– More than 30 government organizations and agencies are represented on the Task Force.</li></ul><p>These three sector groups touch nearly every facet of critical infrastructure that businesses and government require. The Task Force is dedicated to identifying threats and developing solutions to enhance resilience by reducing the attack surface of critical infrastructure. This diverse group is poised perfectly to evaluate existing practices and elevate them to new heights by enhancing existing standards and frameworks with up-to-date practical advice.</p><h2>Working groups</h2><p>The core of the task force is the working groups. These groups are created and disbanded as needed to address core areas of the cyber supply chain. Some of the working groups have been concentrating on areas like:</p><ul><li>The legal risks of information sharing</li><li>Evaluating supply chain threats</li><li>Identifying criteria for building Qualified Bidder Lists and Qualified Manufacturer Lists</li><li>The impacts of the COVID-19 pandemic on supply chains</li><li>Creating a vendor supply chain risk management template</li></ul><h2>Ongoing efforts</h2><p>After two years of producing some great resources and rather large reports, the ICT-SCRM Task Force recognized the need to ensure organizations of all sizes can take advantage of the group’s resources, even if they don’t have a dedicated <a href="/fundamentals/information-security-risk-management/">risk management</a> professional at their disposal. This led to the creation of both a Small and Medium Business (SMB) working group, as well as one dedicated to Product Marketing.</p><p>The SMB working group chose to review and adapt the Vendor SCRM template for use by small and medium businesses, which shows the template can be a great resource for companies and organizations of all sizes.  </p><p>Out of this template, the group described three cyber supply chain scenarios that an SMB (or any size organization, really) could encounter. From that, the group further simplified the process by creating an Excel spreadsheet that provides a document that is easy for SMBs to share with their prospective vendors and partners as a tool to evaluate their cybersecurity posture. Most importantly, the document does not promote a checkbox approach to cybersecurity — it allows for partial compliance, with room provided for explanations. It also allows many of the questions to be removed if the prospective partner possesses a SOC1/2 certification, thereby eliminating duplication in questions.</p><h2>What the future holds</h2><p>At the time of this writing, the Product Marketing and SMB working groups are hard at work making sure everyone, including the smallest businesses, are using the ICT-SCRM Task Force Resources to their fullest potential. Additional workstreams are being developed and will be announced soon, and these will likely include expansion with international partners and additional critical-infrastructure sectors.</p><p>For more information, you can visit the <a href="https://www.cisa.gov/ict-scrm-task-force">CISA ICT-SCRM Task Force website</a>.</p><p><em><strong>Additional reading:</strong></em></p><ul><li><a href="/blog/post/2022/01/19/open-source-security-getting-to-the-root-of-the-problem/"><em>Open-Source Security: Getting to the Root of the Problem</em></a></li><li><a href="/blog/post/2021/10/22/2022-planning-designing-effective-strategies-to-manage-supply-chain-risk/"><em>2022 Planning: Designing Effective Strategies to Manage Supply Chain Risk</em></a></li><li><a href="/blog/post/2021/09/08/security-at-scale-in-the-open-source-supply-chain/"><em>Security at Scale in the Open-Source Supply Chain</em></a></li><li><a href="/blog/post/2021/08/03/the-ransomware-task-force-a-new-approach-to-fighting-ransomware/"><em>The Ransomware Task Force: A New Approach to Fighting Ransomware</em></a></li></ul><div><h4>NEVER MISS A BLOG</h4><p>Get the latest stories, expertise, and news about security today.</p><a href="#">Subscribe</a></div><br/>]]></description>
      <link>https://www.rapid7.com/blog/post/2022/03/14/an-inside-look-at-cisas-supply-chain-task-force</link>
      <guid isPermaLink="false">bltf93bf6769b35f850</guid>
      <category><![CDATA[Supply Chain Security]]></category>
      <category><![CDATA[Government]]></category><dc:creator><![CDATA[Chad Kliewer, MS, CISSP, CCSP]]></dc:creator>
      <pubDate>Mon, 14 Mar 2022 14:05:18 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9411c12f59f8cb9a/683ddf8270aa95b859fe301e/cisa-scrm-taskforce.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[New US Law to Require Cyber Incident Reports]]></title>
      <description><![CDATA[<p> The US Congress is poised to pass the <a href="https://rules.house.gov/sites/democrats.rules.house.gov/files/BILLS-117HR2471SA-RCP-117-35.pdf#page=2524/">Cyber Incident Reporting for Critical Infrastructure Act of 2022</a>. Once signed by the President, it will become law. The law will require critical infrastructure owners and operators to report cyber incidents and ransomware payments. The legislation was developed in the wake of the <a href="/blog/post/2020/12/14/solarwinds-sunburst-backdoor-supply-chain-attack-what-you-need-to-know/">SolarWinds</a> supply chain attack and recently gained additional momentum from the Russia-Ukraine conflict. This post will walk through highlights from the law. </p><p> Rapid7 supports efforts to increase transparency and information sharing in order to strengthen awareness of the cybersecurity threat landscape and prepare for cyberattacks. We applaud passage of the Cyber Incident Reporting for Critical Infrastructure Act. </p><h2>What’s this law about?</h2><p> The<em> </em>Cyber Incident Reporting for Critical Infrastructure Act will require <a href="https://www.cisa.gov/critical-infrastructure-sectors">critical infrastructure owners and operators</a> — such as water and energy utilities, health care organizations, some IT providers, etc. — to submit reports to the Cybersecurity and Infrastructure Security Agency (CISA) for cybersecurity incidents and ransomware payments. The law will provide liability protections for submitting reports to encourage compliance, but noncompliance can result in a civil lawsuit. The law will also require the government to analyze, anonymize, and share information from the reports to provide agencies, Congress, companies, and the public with a better view of the cyber threat landscape.  </p><p> An important note about the timeline: The requirements do not take effect until CISA issues a clarifying regulation. The law will require CISA to issue this regulation <strong>within 42 months</strong> (though CISA may take less time), so the requirements may not be imminent. In the meantime, the Cyber Incident Reporting for Critical Infrastructure Act provides information on what CISA’s future rule must address.<br/></p><p> We detail these items from the law below.  </p><p></p><h2>Requiring reporting of cyber incidents and ransom payments<br/></h2><ul><li><em>Report requirement.</em><em><strong> </strong></em>Critical infrastructure owners and operators must report substantial cybersecurity incidents to CISA, as well as any ransom payments. (However, as described below, this requirement does not come into effect until CISA issues a regulation.)<br/></li><li><em>Type of incident.</em> The types of cyber incidents that must be reported shall include actual breaches of sensitive information and attacks that disrupt business or operations. Mere threats or failed attacks do not need to be reported. <br/></li><li><em>Report timeline.</em> For a cyber incident, the report must be submitted <em>within 72 hours</em> after the affected organization determines the incident is substantial enough that it must be reported. For ransom payments, the report must be submitted <em>within 24 hours</em> after the payment is made. <br/></li><li><em>Report contents.</em><em><strong> </strong></em>The reports must include a list of information, including attacker tactics and techniques. Information related to the incident must be preserved until the incident is fully resolved. <br/></li><li><em>Enforcement</em><em><strong>.</strong></em> If an entity does not comply with reporting requirements, CISA may issue a subpoena to compel entities to produce the required information. The Justice Department may initiate a civil lawsuit to enforce the subpoena. Entities that do not comply with the subpoena may be found in contempt of court. <br/></li></ul><p></p><h2>CISA rule to fill in details<br/></h2><ul><li><em>Rule requirement.</em> CISA is required to issue a regulation that will establish details on the reporting requirements. The reporting requirements do not take effect until this regulation is final.<br/></li><li><em>Rule timeline.</em> CISA has <em>up to 42 months</em> to finalize the rule (but the agency can choose to take less time).<br/></li></ul><ul><li><em>Rule contents</em><em><strong>. </strong></em>The rule will establish the types of cyber incidents that must be reported, the types of critical infrastructure entities that must report, the content to be included in the reports, the mechanism for submitting the reports, and the details for preserving data related to the reports.<br/></li></ul><h2>Protections for submitting reports</h2><ul><li><em>Not used for regulation.</em> Reports submitted to CISA cannot be used to regulate the activities of the entity that submitted the report. <br/></li><li><em>Privileges preserved.</em> The covered entity may designate the reports as commercial and proprietary information. Submission of a report shall not be considered a waiver of any privilege or legal protection.<br/></li><li><em>No liability for submitting. </em>No court may maintain a cause of action against any person or entity on <em>the sole basis of</em> submitting a report in compliance with this law. <br/></li><li><em>Cannot be used as evidence. </em>Reports, and material used to prepare the reports, cannot be received as evidence or used in discovery proceedings in any federal or state court or regulatory body.<br/></li></ul><h2>What the government will do with the report information</h2><ul><li><em>Authorized purposes.</em> The federal government may use the information in the reports cybersecurity purposes, responding to safety or serious economic threats, and preventing child exploitation.<br/></li><li><em>Rapid response.</em> For reports on ongoing threats, CISA must rapidly disseminate cyber threat indicators and defensive measures with stakeholders.<br/></li><li><em>Information sharing.</em> CISA must analyze reports and share information with other federal agencies, Congress, private sector stakeholders, and the public. CISA’s information sharing must include assessment of the effectiveness of security controls, adversary tactics and techniques, and the national cyber threat landscape.<br/></li></ul><h2>What’s Rapid7’s view of the law?</h2><p> Rapid7 views the Cyber Incident Reporting for Critical Infrastructure Act as a positive step. <a href="/blog/post/2021/05/21/calling-for-cybersecurity-in-critical-infrastructure-modernization/">Cybersecurity is essential to ensure critical infrastructure is safe</a>, and this law would give federal agencies more insight into attack trends, and would potentially help provide early warnings of major vulnerabilities or attacks in progress before they spread. The law carefully avoids requiring reports too early in the incident response process and provides protections to encourage companies to be open and transparent in their reports.  </p><p> Still, the Cyber Incident Reporting for Critical Infrastructure Act does little to ensure critical infrastructure has safeguards that prevent cyber incidents from occurring in the first place. This law is unlikely to change the fact that many critical infrastructure entities are under-resourced and, in some cases, have security maturity that is not commensurate with the risks they face. The law’s enforcement mechanism (a potential contempt of court penalty) is not especially strong, and the final reporting rules may not be implemented for another 3.5 years. Ultimately, the law’s effect may be similar to state breach notification laws, which raised awareness but did not prompt widespread adoption of security safeguards for personal information until states implemented data security laws. </p><p> So, the Cyber Incident Reporting for Critical Infrastructure Act is a needed and helpful improvement — but, as always, there is more to be done.  </p><div><h4>NEVER MISS A BLOG</h4><p>Get the latest stories, expertise, and news about security today.</p><a href="#">Subscribe</a></div><br/>]]></description>
      <link>https://www.rapid7.com/blog/post/2022/03/10/new-us-laws-to-require-cyber-incident-reports</link>
      <guid isPermaLink="false">blt363bea06efb4243d</guid>
      <category><![CDATA[Public Policy]]></category>
      <category><![CDATA[Government]]></category>
      <category><![CDATA[Incident Response]]></category>
      <category><![CDATA[Rapid7 Perspective]]></category><dc:creator><![CDATA[Harley Geiger]]></dc:creator>
      <pubDate>Thu, 10 Mar 2022 16:06:09 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt75aa50331532abba/683dde216b437b539d4fa548/cyber-reporting.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Update to GLBA Security Requirements for Financial Institutions]]></title>
      <description><![CDATA[<p>Heads up financial institutions: the Federal Trade Commission (FTC) <a href="https://www.ftc.gov/news-events/press-releases/2021/10/ftc-strengthens-security-safeguards-consumer-financial">announced</a> the first cybersecurity updates to the Gramm Leach-Bliley Act (GLBA) Safeguards Rule since 2003. The new rule strengthens the required security safeguards for customer information. This includes formal risk assessments, access controls, regular penetration testing and vulnerability scanning, and incident response capabilities, among other things.</p><p>Several of these changes go into effect in November 2022, to provide organizations time to prepare for compliance. Below, we’ll detail the changes in comparison to the previous rule.</p><h2>Background on the Safeguards Rule</h2><p>GLBA requires, among other things, a wide range of “financial institutions” to protect customer information. Enforcement for GLBA is split up among several different federal agencies, with FTC jurisdiction covering non-banking financial institutions in the Safeguards Rule. Previously, the Safeguards Rule left the implementation details of several aspects of the information security program up to the financial institution, based on its risk assessment.</p><p>The Safeguards Rule broad <a href="https://www.law.cornell.edu/cfr/text/16/313.3">definition</a> of “financial institutions” includes non-bank businesses that offer financial products or services — such as retailers, automobile dealers, mortgage brokers, non-bank lenders, property appraisers, tax preparers, and others. The definition of “customer information” is also broad, to include any record containing non-public personally identifiable information about a customer that is handled or maintained by or on behalf of a financial institution.</p><h2>Updates to the Safeguards Rule</h2><p>Many of the other updates concern strengthened requirements on how financial institutions must implement aspects of their security programs. Below is a short summary of the changes. Where applicable, we include citations to both the updated rule (starting at page 123) and the <a href="https://www.law.cornell.edu/cfr/text/16/part-314">previous rule</a> (at 16 CFR 314) for easy comparison. </p><h2>Overall security program</h2><ul><li><strong>Current rule:</strong> Financial institutions must maintain a comprehensive, written information security program with administrative, technical, and physical safeguards to ensure the security, confidentiality, and integrity of customer information. 16 CFR 314.3(a)-(b).</li><li><strong>Updated rule:</strong> The updated rule now requires the information security program to include the processes and safeguards listed below (i.e., risk assessment, security safeguards, etc.). 16 CFR 314.3(a).</li><li><strong>Approx. effective date:</strong> November 2022</li></ul><h2>Risk assessment</h2><ul><li><strong>Current rule:</strong> Financial institutions are required to identify internal and external risks to security, confidentiality, and integrity of customer information. The risk assessment must include employee training, risks to information systems, and detecting and responding to security incidents and events. 16 CFR 314.4(b).</li><li><strong>Updated rule:</strong> The update includes more specific criteria for what the risk assessment must include. This includes criteria for evaluating and categorizing of security risks and threats, and criteria for assessing the adequacy of security safeguards. The risk assessment must describe how identified risks will be mitigated or accepted. The risk assessment must be in writing. 16 CFR 314.4(b).</li><li><strong>Approx. effective date:</strong> November 2022</li></ul><h2>Security safeguards</h2><ul><li><strong>Current rule:</strong> Financial institutions must implement safeguards to control the risks identified through the risk assessment. 16 CFR 314.4(c). Financial institutions must require service providers to maintain safeguards to protect customer information. 16 CFR 314.4(d).</li><li><strong>Updated rule:</strong> The updated rule requires that the safeguards must include<br/>- Access controls, including providing the least privilege;<br/>- Inventory and classification of data, devices, and systems;<br/>- Encryption of customer information at rest and in transit over internal networks;<br/>- Secure development practices for in-house software and applications;<br/>- Multi-factor authentication;<br/>- Secure data disposal;<br/>- Change management procedures; and<br/>- Monitoring activity of unauthorized users and detecting unauthorized access or use of customer information. 16 CFR 314.4(c)(1)-(8).</li><li><strong>Approx. effective date:</strong> November 2022</li></ul><h2>Testing and evaluation</h2><ul><li><strong>Current rule:</strong> Financial institutions must regularly test or monitor the effectiveness of the security safeguards, and make adjustments based on the testing. 16 CFR 314.4(c), (e).</li><li><strong>Updated rule:</strong> Regular testing of safeguards must now include either continuous monitoring or periodic penetration testing (annually) and vulnerability assessments (semi-annually). 16 CFR 314.4(d).</li><li><strong>Approx. effective date:</strong> November 2022</li></ul><h2>Incident response</h2><ul><li><strong>Current rule:</strong> Financial institutions must include cybersecurity incident detection and response in their risk assessments, and have safeguards to address those risks. 16 CFR 314.4(b)(3)-(c).</li><li><strong>Updated rule:</strong> Financial institutions are required to establish a written plan for responding to any security event materially affecting confidentiality, integrity, or availability of customer information. 16 CFR 314.4(h).</li><li><strong>Approx. effective date:</strong> November 2022</li></ul><h2>Workforce and personnel</h2><ul><li><strong>Current rule:</strong> Financial institutions must designate an employee to coordinate the information security program. 16 CFR 314.4(a). Financial institutions must select service providers that can maintain security and require service providers to implement the safeguards. 16 CFR 314.4(d).</li><li><strong>Updated rule:</strong> The rule now requires designation of a single “qualified individual” to be responsible for the security program. This can be a third-party contractor. 16 CFR 314.4(a). Financial institutions must now provide security awareness training and updates to personnel. 16 CFR 314.4(e). The rule now also requires periodic reports to a Board of Directors or governing body regarding all material matters related to the information security program. 16 CFR 314.4(i).</li><li><strong>Approx. effective date:</strong> November 2022</li></ul><h2>Scope of coverage</h2><ul><li><strong>Updated rule:</strong> The FTC update expands on the definition of “financial institution” to require “finders” — companies that bring together buyers and sellers — to follow the Safeguards Rule. 16 CFR 314.2(h)(1). However, financial institutions that maintain customer information on fewer than 5,000 consumers are exempt from the requirements of a written risk assessment, continuous monitoring or periodic pentesting and/or vulnerability scans, incident response plan, and annual reporting to the Board. 16 CFR 314.6.</li><li><strong>Approx. effective date:</strong> November 2021 (unlike many of the other updates, this item is not delayed for a year)</li></ul><h2>Incident reporting next?</h2><p>In addition to the above, the FTC is also <a href="https://www.ftc.gov/policy/federal-register-notices/16-cfr-part-314-standards-safeguarding-customer-information-2">considering</a> requirements that financial institutions report cybersecurity incidents and events to the FTC. Similar requirements are in place under the <a href="/solutions/compliance/ny-dfs-cybersecurity-requirements/">Cybersecurity Regulation</a> at the New York Department of Financial Services. If the FTC moves forward with these incident reporting requirements, financial institutions could expect the requirements to be implemented later in 2022 or early 2023.</p><p>Financial institutions with robust security programs will already be performing many of these practices. For them, the updated Safeguards Rule will not represent a sea change in internal security operations. However, by making these security practices a formal regulatory requirement, the updated Safeguards will make accountability and compliance even more important.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2021/11/10/update-to-glba-security-requirements-for-financial-institutions</link>
      <guid isPermaLink="false">blta854ed1fe2a5e962</guid>
      <category><![CDATA[Public Policy]]></category>
      <category><![CDATA[Government]]></category>
      <category><![CDATA[Financial Services]]></category><dc:creator><![CDATA[Harley Geiger]]></dc:creator>
      <pubDate>Wed, 10 Nov 2021 19:55:30 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt408d0f452cae9502/683ddcfc2a9b6813c82bd13f/safe.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Cybersecurity in the Infrastructure Bill]]></title>
      <description><![CDATA[<p>On August 10, 2021, the U.S. Senate passed the Infrastructure Investment and Jobs Act of 2021 (<a href="https://www.congress.gov/bill/117th-congress/house-bill/3684/text">H.R.3684</a>). The bill comes in at 2,700+ pages, provides for $1.2T in spending, and includes several cybersecurity items. We expect this legislation to become law around late September and do not expect significant changes to the content. This post provides highlights on <a href="/fundamentals/what-is-cybersecurity/">cybersecurity</a> from the legislation.</p><p>(Check out our joint letter calling for cybersecurity in infrastructure legislation <a href="/globalassets/_pdfs/policy/american-jobs-plan-052021.pdf">here</a>.)</p><h2>Cybersecurity is a priority — that’s progress</h2><p>Cybersecurity is essential to ensure modern infrastructure is safe, and Rapid7 commends Congress and the Administration for including cybersecurity in the Infrastructure Investment and Jobs Act. Rapid7 <a href="/blog/post/2021/05/21/calling-for-cybersecurity-in-critical-infrastructure-modernization/">led industry calls</a> to include cybersecurity in the bill, and we are encouraged that several priorities identified by industry are reflected in the text, such as cybersecurity-specific funding for state and local governments and the electrical grid.</p><p>On the other hand, cybersecurity will be competing with natural disasters and extreme weather for funding in many (not all) grants created under the bill. In addition, not all critical infrastructure sectors receive cybersecurity resources through the legislation, with healthcare being a notable exclusion. Congress should address these gaps in the upcoming budget reconciliation package.</p><h2>What’s in the bill for infrastructure cybersecurity</h2><p>Below is a brief-ish summary of cybersecurity-related items in the bill. The infrastructure sectors with the most allocations appear to be energy, water, transportation, and state and local governments. Many of these funding opportunities take the form of federal grants for infrastructure resilience, which includes cybersecurity as well as natural hazards. Other funds are dedicated solely to cybersecurity.</p><p>Please note that this list aims to include major infrastructure cybersecurity funding items, but is not comprehensive. (For example, the bill also provides funding for the National Cyber Director.) Citations to <a href="https://www.congress.gov/bill/117th-congress/house-bill/3684/text">the Senate-passed legislation</a> are included.</p><ol><li><p><strong>State and local governments:</strong> <em>$1B over 4 years for the State, Local, Tribal, and Territorial (SLTT) Grant Program.</em> This new grant program will help SLTT governments to develop or implement cybersecurity plans. FEMA will administer the program. This is also known as The State and Local Cybersecurity Improvement Act. [Sec. 70611]</p></li><li><p><strong>Energy:</strong> <em>$250M over five years for the Rural and Municipal Utility Advanced Cybersecurity Grant and Technological Assistance Program.</em> The Department of Energy (DOE) must create a new program to provide grants and technical assistance to improve electric utilities’ ability to detect, respond to, and recover from cybersecurity threats. [Sec. 40124]</p></li><li><p><strong>Energy:</strong> <em>Enhanced grid security.</em> The DOE must create a program to develop advanced cybersecurity applications and technologies for the energy sector, among other things. Over a period of five years, this section authorizes $250M for the Cybersecurity for the Energy Sector RD&D program, $50M for the Energy Sector Operational Support for Cyberresilience Program, and $50M for Modeling and Assessing Energy Infrastructure Risk. [Sec. 40125]</p></li><li><p><strong>Energy:</strong> <em>State energy security plans.</em> This creates federal financial and technical assistance for states to develop or implement an energy security plan that secures state energy infrastructure against cybersecurity threats, among other things. [Sec. 40108]</p></li><li><p><strong>Water:</strong> <em>$250M over 5 years for the Midsize and Large Drinking Water System Infrastructure Resilience and Sustainability Program.</em> This creates a new grant program to assist midsize and large drinking water systems with increasing resilience to cybersecurity vulnerabilities, as well as natural hazards. [Sec. 50107]</p></li><li><p><strong>Water:</strong> <em>$175M over five years for technical assistance and grants for emergencies affecting public water systems.</em> This extends an expired fund to help mitigate threats and emergencies to drinking water. This includes, among other things, emergency situations caused by a cybersecurity incident. [Sec. 50101]</p></li><li><p><strong>Water:</strong> <em>$25M over five years for the Clean Water Infrastructure Resiliency and Sustainability Program.</em> This creates a new program providing grants to owners/operators of publicly owned treatment works to increase the resiliency of water systems against cybersecurity vulnerabilities, as well as natural hazards. [Sec. 50205]</p></li><li><p><strong>Transportation:</strong> <em>Cybersecurity eligible for National Highway Performance Program (NHPP).</em> This expands on the existing NHPP grant program to allow states to use funds for resiliency of the National Highway System. "Resiliency" includes cybersecurity, as well as natural hazards. [Sec. 11105]</p></li><li><p><strong>Transportation:</strong> <em>Cybersecurity eligible for Surface Transportation Block Grant Program.</em> This expands the existing grant program to allow funding measures to protect transportation facilities from cybersecurity threats, among other things. [Sec. 11109]</p></li><li><p><strong>General:</strong> <em>$100M over five years for the Cyber Response and Recovery Fund.</em> This creates a fund for CISA to provide direct support to public or private entities that respond and recover from cyberattacks and breaches designated as a “significant incident.” The support can include technical assistance and response activities, such as vulnerability assessment, threat detection, network protection, and more. The program ends in 2028. [Sec. 70602, Div. J]</p></li></ol><h2>Other sectors next?</h2><p>These cybersecurity items are significant down payments to safeguard the nation’s investment in infrastructure modernization. Combined with the recent <a href="/blog/post/2021/06/01/how-the-biden-administrations-cybersecurity-order-will-affect-companies/">Executive Order</a> and <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2021/07/28/national-security-memorandum-on-improving-cybersecurity-for-critical-infrastructure-control-systems/">memorandum on industrial control systems security</a>, the Biden Administration is demonstrating that cybersecurity is a high priority.</p><p>However, more work must be done to address cybersecurity weaknesses in critical infrastructure. While the Infrastructure Investment and Jobs Act provides cybersecurity resources for some sectors, most of the <a href="https://www.cisa.gov/critical-infrastructure-sectors">16 critical infrastructure sectors</a> are excluded. Healthcare is an especially notable example, as the sector faces <a href="https://arstechnica.com/gadgets/2021/08/hospitals-hamstrung-by-ransomware-are-turning-away-patients/?utm_brand=arstechnica&amp;utm_source=twitter&amp;utm_social-type=owned&amp;utm_medium=social">a serious ransomware problem</a> in the middle of a deadly pandemic.</p><p>Congress is now preparing a larger <a href="https://www.democrats.senate.gov/imo/media/doc/MEMORANDUM%20for%20Democratic%20Senators%20-%20FY2022%20Budget%20Resolution.pdf">budget reconciliation bill</a>, to be advanced at roughly the same time as the infrastructure legislation. We encourage Congress and the Administration to take this opportunity to boost cybersecurity for other sectors, especially healthcare. <a href="/blog/post/2021/05/21/calling-for-cybersecurity-in-critical-infrastructure-modernization/">As with the infrastructure bill</a>, we suggest providing grants dedicated to cybersecurity, and requiring that grant funds be used to adopt or implement standards-based security safeguards and risk management practices.</p><p>Congress' activity during the COVID-19 crisis continues to be punctuated by large, ambitious bills. To secure the modern economy and essential services, we hope the Infrastructure Investment and Jobs Act sets a precedent that sound cybersecurity policies will be integrated into transformative legislation to come.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2021/08/31/cybersecurity-in-the-infrastructure-bill</link>
      <guid isPermaLink="false">blt45d807e17edb1671</guid>
      <category><![CDATA[Public Policy]]></category>
      <category><![CDATA[Government]]></category>
      <category><![CDATA[Critical Infrastructure]]></category><dc:creator><![CDATA[Harley Geiger]]></dc:creator>
      <pubDate>Tue, 31 Aug 2021 17:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5462c73408c464d2/683ddf70ca9dfc273f526638/infrastructure.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Hack Back Is Still Wack]]></title>
      <description><![CDATA[<p>Every year or two, we see a <a href="/blog/post/2018/04/17/georgia-should-not-authorize-hack-back/">policy proposal around authorizing private-sector hack back</a>. The latest of these is <a href="https://www.daines.senate.gov/imo/media/doc/ALB21A63.pdf?utm_campaign=wp_the_cybersecurity_202&amp;utm_medium=email&amp;utm_source=newsletter&amp;wpisrc=nl_cybersecurity202">legislation from two U.S. Senators</a>, Daines and Whitehouse, and it would require the U.S. Department of Homeland Security (DHS) to “conduct a study on the potential benefits and risks of amending section 1030 of title 18, United States Code (commonly known as the 'Computer Fraud and Abuse Act'), to allow private entities to take proportional actions in response to an unlawful network breach, subject to oversight and regulation by a designated Federal agency.”</p><p>While we believe the bill would be harmful and do not support the bill in any way, we do acknowledge that at least this legislation is attempting to address how hack back could work in practice and identifying the potential risks. This gets at the heart of one of the main issues with policy proposals for hack back — they rarely address how it would actually work in reality, and how opportunities for abuse or unintended harms would be handled. </p><p>Rapid7 does not believe it’s possible to provide sufficient oversight or accountability to make private-sector hack back viable without negative consequences. Further, the very fact that we're once again discussing private-sector hack back as a possibility is extremely troubling. </p><p>Here, we’ll outline <a href="/globalassets/_pdfs/policy/hack-back-position-20210617.pdf">why Rapid7 is against the authorization of private-sector hack back</a>.</p><h2>What is hack back?</h2><p>When we say “hack back,” we’re referring to non-government organizations taking intrusive action against a cyber attacker on technical assets or systems not owned or leased by the person taking action or their client. This is generally illegal in countries that have anti-hacking laws. </p><p>The appeal of hack back is easy to understand. Organizations are subject to more frequent, varied, and costly attacks, often from cybercriminals who have no fear of reprisal or prosecution due to the existence of safe-haven nations that either can’t or won’t crack down on their activities. The scales feel firmly stacked in the favor of these cybercriminals, and it’s understandable that organizations want to shift that balance and give attackers reason to think again before targeting them. </p><p>Along these lines, arguments for hack back justify it in a number of ways, citing a desire to recapture lost data, better understand the nature of the attacks, neutralize threats, or use the method as a tit for tat. Hack back activities may be conflated with threat hunting, threat intelligence, or <a href="/solutions/incident-detection-and-response/">detection and response</a> activities. Confusingly, <a href="https://www.cyberupcampaign.com/about">some proponents</a> for these activities are quick to decry hack back while simultaneously advocating for authority to take intrusive action on third-party assets without consent from their owners. </p><p>Hack back is also sometimes referred to as Active Defense or <a href="https://www.congress.gov/bill/116th-congress/house-bill/3270?q=%7B%22search%22%3A%5B%22active+cyber+defense+act%22%5D%7D&amp;s=7&amp;r=1">Active Cyber Defense</a>. This can cause confusion, as these terms can also refer to other defensive measures that are not intrusive or conducted without consent from the technology owner. For example, active defense can also describe intrusion prevention systems or <a href="/fundamentals/deception-technology/">deception technologies</a> designed to confuse attackers and gain greater intelligence on them, such as <a href="/fundamentals/honeypots/">honeypots</a>. Rapid7 encourages organizations to employ active defense techniques within their own environments.</p><h2>Rapid7’s criticisms of hack back</h2><p>While the reasons for advocating for private-sector hack back are easy to understand and empathize with, that doesn’t make the idea workable in practice. There’s a wealth of reasons why hack back is a bad idea.</p><h3>Impracticalities of attribution and application</h3><p>One of the most widely stated and agreed-upon tenets in security is that attribution is hard. In fact, in many cases, it’s essentially impossible to know for certain that we’ve accurately attributed an attack. Even when we find indications that point in a certain direction, it’s very difficult to ensure they’re not red herrings intentionally planted by the attacker, either to throw suspicion off themselves or specifically to incriminate another party. </p><p>We like to talk about digital fingerprints, but the reality is that there's no such thing: In the digital world, pretty much anything can be spoofed or obfuscated with enough time, patience, skill, and resources. Attackers are constantly evolving their techniques to stay one step ahead of defenders and law enforcement, and the emergence of deception capabilities is just one example of this. So being certain we have the right actor before we take action is extremely difficult. </p><p>In addition, where do we draw the line in determining whether an actor or computing entity could be considered a viable target? For example, if someone is under attack from devices that are being controlled as part of a <a href="/fundamentals/botnet/">botnet</a>, those devices – and their owners – are as much victims of the attacker as the target of the attack. </p><p><a href="/research/project-lorelei/">Rapid7’s Project Lorelei</a> observes exactly this phenomenon: The honeypots often pick up traffic from legitimate organizations whose systems have been compromised and leveraged in malicious activity. Should one of these compromised systems be used to attack an organization, and that organization then take action against those affected systems to neutralize the threat against themselves, that would mean the organization defending itself was revictimizing the entity whose systems were already compromised. Depending on the action taken, this could end up being catastrophic and costly for both organizations.  </p><p>We must also take motivations into account, even though they’re often unclear or easy to misunderstand. For example, research projects that scan ports on the public-facing internet do so in order to help others understand the attack surface and reduce exposure and opportunities for attackers. This activity is benign and often results in security disclosures that have helped security professionals reduce their organization’s risk. However, it’s not unusual for these scans to encounter a perimeter monitoring tool, throwing up an alert to the security team. If an organization saw the alerts and, in their urgency to defend themselves, took a “shoot first, ask questions later” approach, they could end up attacking the researcher.</p><h3>Impracticalities of limiting reach and impact</h3><p>Many people have likened hack back to homeowners defending their property against intruders. They evoke images of malicious, armed criminals breaking into your home to do you and your loved ones harm. They call to you to arm yourself and stand bravely in defense, refusing to be a victim in your own home. </p><p>It’s an appealing idea — however, the reality is more akin to standing by your fence and spraying bullets out into the street, hoping to get lucky and stop an attacker as they flee the scene of the crime. With such an approach, even if you do manage to reach your attacker, you’re risking terrible collateral damage, too. </p><p>This is because the internet doesn’t operate in neatly defined and clearly demarcated boundaries. If we take action targeted at a specific actor or group of actors, it would be extremely challenging to ensure that action won’t unintentionally negatively impact innocent others. Not only should this concern lawmakers, it should also disincentivize participation. The potential negative consequences of a hack back gone awry could be far-reaching. We frequently discuss damage to equipment or systems, or loss of data, but in the age of the Internet of Things, negative consequences could include physical harm to individuals. And let’s not forget that cyberattacks can be considered acts of war. </p><p>Organizations that believe they can avoid negative outcomes in the majority of cases need to understand that even just one or two errors could be extremely costly. Imagine, for example, that a high-value target organization, such as a bank, undertakes 100 hack backs per year and makes a negatively impactful error on two occasions. A 2% fail rate may not seem that terrible — but if either or both of those errors resulted in compromise of another company or harm to a group of individuals, the hack-backer could see themselves tied up in expensive legal proceedings, reputational damage, and loss of trust. Attempts to make organizations exempt from this kind of legal action are problematic, as they raise the question of how we can spot and stop abuses.</p><h3>Impracticalities of providing appropriate oversight</h3><p>To date, proposals to legalize hack back have been overly broad and non-specific about how such activities should be managed, and what oversight would be required to ensure there are no abuses of the system. The Daines/Whitehouse bill tries to address this and alludes to a framework for oversight that would determine “which entities would be allowed to take such actions and under what circumstances.”</p><p>This seems to refer to an approach commonly advocated by proponents of hack back whereby a license or special authorization to conduct hack back activities is granted to vetted and approved entities. Some advocates have pointed to the example of how privateers were issued <a href="https://www.csiac.org/journal-article/rebooting-letters-of-marque/">Letters of Marque</a> to capture enemy ships — and their associated spoils. Putting aside fundamental concerns about taking as our standard a 200-year-old law passed during a time of prolonged kinetic war and effectively legalizing piracy, there are a number of pragmatic issues with how this would work in practice.   </p><p>Indeed, creating a framework and system for such oversight is highly impractical and costly, raising many issues. The government would need to determine basic administrative issues, such as who would run it and how it would be funded. It would also need to identify a path to address far more complex issues around accountability and oversight to avoid abuses. For example, who will determine which activities are acceptable and where the line should be drawn? How would an authorizing agent ensure standards are met and maintained within approved organizations? Existing cybersecurity certification and accreditation schemes have long <a href="https://www.theregister.com/2021/05/17/crest_not_publishing_cert_exam_cheat_report/">raised concerns</a>, and these will only worsen when certification results in increased authorities for activities that can result in harm and escalation of aggressions on the internet. </p><p>When a government entity itself takes action against attackers, it does so with a high degree of oversight and accountability. They must meet evidentiary standards to prove the action is appropriate, and even then, there are parameters determining the types of targets they can pursue and the kinds of actions they can take. Applying the same level of oversight to the private sector is impractical. At the same time, authorizing the private sector to participate in these activities without this same level of oversight would undermine the checks and balances in place for the government and likely lead to unintended harms. </p><p>An authorizing agent cannot have eyes everywhere and at all times, so it would be highly impractical to create a system for oversight that would enable the governing authority to spot and stop accidental or intentional abuses of the system in real time. If the Daines/Whitehouse bill does pass (and we have no indication of that at present), I very much hope that DHS’s resulting report will reflect these issues or, if possible, provide adequate responses to address these concerns.</p><h3>Impracticalities of legal liability and jurisdiction</h3><p>These issues of practical execution also raise questions around who will bear the responsibility and liability if something goes wrong. For example, if a company hacks back and accidentally harms another organization or individual, the entity that undertook the hacking may incur expensive legal proceedings, reputational damage, and loss of trust. They could become embroiled in complicated and expensive multi-jurisdiction legal action, even if the company has a license to hack back in its home jurisdiction. In scenarios where hack back activities are undertaken by an organization or individual on behalf of a third party, both the agent and their client may bear these negative consequences. There may also be an argument that any licensing authority could also bear some of the liability.  </p><p>Making organizations exempt from legal action around unintended consequences would be problematic and likely to result in more recklessness, as well as infringing on the rights of the victim organization. While the internet is a borderless space accessed from every country in the world, each of those countries has its own legal system and expects its citizens to abide by it. It would be very risky for companies and individuals who hack back to avoid running afoul of the laws of other countries or international bodies. When national governments take this kind of action, it tends to occur within existing international legal frameworks and under some regulatory oversight, but this may not apply in the private sector, again begging the question of where the liability rests. </p><p>It’s also worth noting that once one major power authorizes private-sector hack back, other governments will likely follow, and legal expectations or boundaries may vary. This raises questions of how governments will respond when their citizens are being attacked as part of a private-sector hack back gone wrong, and whether it will likely lead to escalation of political tensions.</p><h3>Inequalities of applicability</h3><p>Should a viable system be developed and hack back authorized, effective participation would likely be costly, as it would require specialist skills. Not every organization would be able to participate. If the authorization framework isn't stringent, many organizations might try to participate with insufficient expertise, which would likely be ineffective, damaging, or both. At the same time, other organizations won’t have the maturity or budget to participate even in this way. </p><p>These are the same organizations that sit below the “cybersecurity poverty line” and can’t afford a great deal of in-house security expertise and technologies to protect themselves – in other words, these organizations are already highly vulnerable. As organizations that do have sufficient resources start to hack back, the cost of attacking these organizations will increase. Profit-motivated attackers will eventually shift toward targeting the less-resourced organizations that reside below the security poverty line. Rather than authorizing a measure as fraught with risk as hack back, we should instead be thinking about how to better protect these vulnerable organizations — for example, by subsidizing or incentivizing security hygiene.</p><h2>The line between legitimate research and hack back</h2><p>Those who follow <a href="/about/public-policy/">Rapid7’s policy work</a> will know that we’re big proponents of security research and have worked for many years to see greater recognition of <a href="/blog/post/2018/11/01/expanded-protections-for-security-researchers-under-dmca-sec-1201/">its value and importance</a> in public policy. It may come as a surprise to see us <a href="/globalassets/_pdfs/policy/hack-back-position-20210617.pdf">advocate so enthusiastically against hack back </a>as, from a brief look, they have some things in common. In both cases, we’re talking about activity undertaken in the name of cybersecurity, which may be intrusive in nature and involve third-party assets without consent of the owner. </p><p>While independent, good-faith security research and threat intelligence investigations are both very valuable for security, they're not the same thing, and we don’t believe we should view related legal restrictions in the same way for both. </p><p>Good-faith security research is typically performed independently of manufacturers and operators in order to identify flaws or exposures in systems that provide opportunities for attackers. The goal is to remediate or mitigate these issues so we can reduce opportunities for attackers and thus decrease the risk for technology users. This kind of research is generally about protecting the safety and privacy of the many, and while researchers may take actions without authorization, they only perform those actions on the technology of those ultimately responsible for both creating and mitigating the exposure. Without becoming aware of the issue, the technology provider and their users would continue to be exposed to risk. </p><p>Research may bypass authorization to sidestep issues arising from manufacturers and operators prioritizing their reputation or profit above the security of their customers. In contrast, threat intel investigations or operations that involve interrogating or interacting with third-party assets prioritize the interests of the specific entity undertaking or commissioning the activity, rather than other potential victims whose compromised assets may have been leveraged in the attack. </p><p>While threat intelligence can help us understand attacker behavior and identify or prepare for attacks, data gathering and operations should be limited only to assessing risks and threats to assets that are owned or operated by the entity authorizing the work, or to non-invasive activities such as port scanning. Because <a href="/fundamentals/types-of-attacks/">cyber attacks</a> are criminal activity, if more investigation is needed, it should be undertaken with appropriate law enforcement involvement and oversight.</p><h2>The path forward</h2><p>It seems likely that the hack back debate will continue to come up as organizations strive to find new ways to repel attacks. I could make a snarky comment here about how organizations should perhaps focus instead on user awareness training, reducing their attack exposure, managing supply chain risk, proper segmentation, patching, <a href="/fundamentals/iam-identity-and-access-management/">Identity Access Management (IAM)</a>, and all the other things that make up a robust defense-in-depth program and that we frequently see fail, but I shall refrain. Cough cough. </p><p>We shall wait to see what happens with Senators Daines’ and Whitehouse’s “Study on Cyber-Attack Response Options Act’’ bill and hope that, if it passes, DHS will consider the concerns raised in this blog. The same is true for other policymakers as cybercrime is an international blight and governments around the world are subject to lobbying from entities looking to take a more active role in their defense. While we understand and sympathize with the desire to do more, take more control, and fight back, we urge policymakers to be mindful of the potential for catastrophe.</p><div><h4>NEVER MISS A BLOG</h4><p>Get the latest stories, expertise, and news about security today.</p><a href="#">Subscribe</a></div><br/>]]></description>
      <link>https://www.rapid7.com/blog/post/2021/08/10/hack-back-is-still-wack</link>
      <guid isPermaLink="false">blta5990b9325c64aad</guid>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[Government]]></category>
      <category><![CDATA[Public Policy]]></category>
      <category><![CDATA[Cybersecurity]]></category>
      <category><![CDATA[Hacking]]></category><dc:creator><![CDATA[Jen Ellis]]></dc:creator>
      <pubDate>Tue, 10 Aug 2021 13:32:24 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blteb9c653a23087b38/683de3512a9b6841f22bd332/govt-security.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Attackers Targeting Fortinet Devices and SAP Applications]]></title>
      <description><![CDATA[<p><em>The following blog was co-authored by Caitlin Condon and </em><a href="/blog/author/bob-rudis/"><em>Bob Rudis</em></a><em>, also known (in his own words) as “some caveman from Maine.”</em></p><p>Last week, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the FBI <a href="https://us-cert.cisa.gov/ncas/current-activity/2021/04/02/fbi-cisa-joint-advisory-exploitation-fortinet-fortios">published a joint alert</a> to warn users that APT threat actors were likely exploiting unpatched Fortinet FortiOS devices to gain initial access to government, commercial, technology, and other organizations’ networks. The alert highlighted three FortiOS vulnerabilities, all of which were previously known, and at least one of which (CVE-2018-13379) has been broadly exploited for more than 18 months. This week, CISA <a href="https://us-cert.cisa.gov/ncas/current-activity/2021/04/06/malicious-cyber-activity-targeting-critical-sap-applications">published an additional alert</a> amplifying a threat report from security firm Onapsis, which describes <a href="https://onapsis.com/active-cyberattacks-mission-critical-sap-applications">ongoing attacks against SAP applications</a>.</p><p>Rapid7 has previously analyzed a number of the highest-severity vulnerabilities enumerated in this latest set of alerts. The CVEs included in these reports have been detailed below, along with recommendations for organizations seeking to defend themselves against ongoing exploitation. Notably, none of these vulnerabilities are new—many of them are a year or more old, which underscores the need for a regular patch cycle, as well as a defined patch cycle exception process.</p><h2>FortiOS vulnerabilities</h2><p>Fortinet devices are what we call <strong>network pivots</strong>—that is, the position they occupy in organizations’ networks gives external attackers the ability to access internal networks if exploited successfully, which in turn allows for a range of secondary attacks and other nefarious activities. If at all possible, defenders should strongly consider implementing a “zero-day” patch cycle for internet-exposed and other network pivot products, including (but not only) Fortinet and other VPNs. InsightVM and Nexpose customers can assess their exposure to all three FortiOS CVEs below with vulnerability checks.</p><ul><li>CVE-2018-13379 is a pre-authentication information disclosure vulnerability that arises from a path traversal flaw in the web portal component of FortiOS SSL VPNs. The vulnerability allows external attackers to download FortiOS system files through specially crafted HTTP resource requests and has been <a href="https://us-cert.cisa.gov/ncas/current-activity/2019/10/04/vulnerabilities-exploited-multiple-vpn-applications">exploited in the wild since 2019</a>. Read our <a href="https://attackerkb.com/topics/VEc81wfDS7/cve-2018-13379-path-traversal-in-fortinet-fortios?referrer=blog#rapid7-analysis">full analysis of CVE-2018-13379 and its history here</a>.</li><li><a href="https://attackerkb.com/topics/sWpteHiN5z/cve-2019-5591?referrer=blog">CVE-2019-5591</a> is a default configuration vulnerability in FortiOS that allows an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server.</li><li><a href="https://attackerkb.com/topics/8qnr47UsVL/cve-2020-12812?referrer=blog">CVE-2020-12812</a> is an improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6.2.3, 6.0.9 and below that gives a user the ability to log in successfully without being prompted for the second factor of authentication (FortiToken) if that user changes the case of their username.</li></ul><p>Since the beginning of March, Rapid7 Labs' Heisenberg Honeypot fleet has seen nearly 60 IP addresses attempting common, known single GET request exploits against Fortinet devices (we’ve grouped the IP addresses up to the hosting provider/ISP level):</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9832a0db7de83a8e/683ddfb3e3c8aa57bf830d34/image2.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image2.png" asset-alt="image2.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9832a0db7de83a8e/683ddfb3e3c8aa57bf830d34/image2.png" data-sys-asset-uid="blt9832a0db7de83a8e" data-sys-asset-filename="image2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image2.png" sys-style-type="display"/></figure><p>Unfortunately, our fleet does not emulate Fortinet devices. Since these devices are fairly easy to distinguish on the internet (nearly 1 million of them in the image, below)—due to the common, vendor SSL certificate they use—it is surprising to see opportunistic exploit attempts versus just inventory/discovery scans.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9fd4c9f18240c750/683ddfde18a553431e686fdb/image1.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image1.png" asset-alt="image1.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9fd4c9f18240c750/683ddfde18a553431e686fdb/image1.png" data-sys-asset-uid="blt9fd4c9f18240c750" data-sys-asset-filename="image1.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image1.png" sys-style-type="display"/></figure><p>That last sentence should help organizations underscore why CISA and the FBI raised the Fortinet exploitation campaign to the level of a joint alert: Attackers can easily identify legitimate Fortinet endpoints on the internet, and it takes virtually no time from discovery to exploit if a target system is not patched and configured properly.</p><a href="https://www.fortinet.com/blog/psirt-blogs/patch-vulnerability-management" rel="nofollow">a post on patch and vulnerability management</a><a href="https://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=FD50697&amp;sliceId=1&amp;docTypeID=DT_KCARTICLE_1_1&amp;dialogID=184200521&amp;stateId=1%200%20184202090%27" rel="nofollow">how to keep notified about Fortinet patch releases</a><p>As Fortinet notes in that post, these weaknesses have had patches available for quite some time, so if you’re just getting around to fixing them, you may need to dedicate some further cycles to some forensic activity, as it is very likely one or more attackers have already taken advantage of these vulnerabilities.</p><p>To learn more about other vulnerabilities that functioned as network pivots for attackers, read <a href="/research/report/vulnerability-intelligence-report/">Rapid7’s 2020 Vulnerability Intelligence Report</a>.</p><h2>Actively exploited SAP vulnerabilities</h2><p>The two most recent SAP vulnerabilities detailed in Onapsis’ threat report are CVE-2020-6287, a CVSS-10 vulnerability in the SAP NetWeaver Application Server (AS) Java component LM Configuration Wizard that has been actively exploited in the wild since July 2020, and SAP Solution Manager CVE-2020-6207. Both of these vulnerabilities allow broad compromise of SAP applications and environments.</p><ul><li>CVE-2020-6287 is present by default in SAP applications running on top of SAP NetWeaver AS Java 7.3 and any newer versions (up to SAP NetWeaver 7.5). It allows remote, unauthenticated attackers to exploit and fully compromise vulnerable SAP installations. Exploitation of CVE-2020-6287 through the HTTP interface allows for modification or extraction of highly sensitive information and disruption of critical business processes. For a list of affected applications and additional guidance, read Rapid7’s <a href="https://attackerkb.com/topics/JubO1RiVBP/cve-2020-6287-critical-vulnerability-in-sap-netweaver-application-server-as-java?referrer=blog#rapid7-analysis">full analysis here</a>.</li><li>CVE-2020-6207 arises from a missing authentication check in version 7.2 of SAP’s Solution Manager product, allowing attackers to completely compromise all SMDAgents connected to the Solution Manager.<br/><br/>SAP customers should pay close attention to their access logs and monitor for unauthorized user account creation; they should also ensure that web services in general do not run using privileged accounts. InsightVM and Nexpose customers can assess their risk to CVE-2020-6287 with a remote vulnerability check. A check for CVE-2020-6207 is currently under development.</li></ul><p>Other SAP vulnerabilities noted as being exploited in the wild include:</p><ul><li>CVE-2018-2380 affects SAP CRM versions 7.01, 7.02, 7.30, 7.31, 7.33, and 7.54. The vulnerability allows an attacker to exploit insufficient validation of path information provided by users, letting characters representing "traverse to parent directory" pass through to the file APIs.</li><li>CVE-2016-9563 is a vulnerability in SAP NetWeaver Application Server (AS) Java 7.5 that allows remote authenticated users to conduct XML External Entity (XXE) attacks via the sap.com~tc~bpem~him~uwlconn~provider~web/bpemuwlconn URI.</li><li>CVE-2016-3976 is a directory traversal vulnerability in SAP NetWeaver AS Java 7.1 through 7.5 that allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the fileName parameter to CrashFileDownloadServlet.</li><li>CVE-2010-5326 is a CVSS-10 vulnerability in the Invoker Servlet on SAP NetWeaver Application Server Java platforms that arises from a lack of authentication and allows remote attackers to execute arbitrary code via an HTTP or HTTPS request. It was used in attacks from 2013 to 2016.</li></ul><a href="https://www.onapsis.com/active-cyberattacks-mission-critical-sap-applications" rel="nofollow">available from Onapsis here</a><p></p><div><h4>NEVER MISS A BLOG</h4><p>Get the latest stories, expertise, and news about security today.</p><a href="#">Subscribe</a></div><br/>]]></description>
      <link>https://www.rapid7.com/blog/post/2021/04/08/attackers-targeting-fortinet-devices-and-sap-applications</link>
      <guid isPermaLink="false">bltb69f3a3c2875f41a</guid>
      <category><![CDATA[Emergent Threat Response]]></category>
      <category><![CDATA[Government]]></category><dc:creator><![CDATA[Caitlin Condon]]></dc:creator>
      <pubDate>Thu, 08 Apr 2021 17:18:07 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt4bca88971db40990/683de00b3beff08624a7c417/target.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Congress unanimously passes federal IoT security law]]></title>
      <description><![CDATA[<p><br/><em><strong>Update 12/04/20:</strong></em><em> The IoT Cybersecurity Improvement Act was signed into law and is now Public Law No: 116-207.</em></p><p>The US Senate unanimously passed the <a href="https://www.congress.gov/bill/116th-congress/house-bill/1668/text">IoT Cybersecurity Improvement Act (H.R.1668)</a> yesterday. The US House passed the bill in September, so it is highly likely to become law, barring a Presidential veto.  </p><p>This is arguably the most significant US IoT-specific cybersecurity law to date, as well as the most significant law promoting private sector adoption of coordinated vulnerability disclosure. IoT security is widely acknowledged as a global priority, and vulnerability disclosure processes are fundamental security practices, so passage of the bill should be seen as a very positive step forward for cybersecurity and the security community.<br/></p><p>Rapid7 applauds passage of the IoT Cybersecurity Improvement Act and looks forward to working with NIST and other stakeholders on its implementation. The bill's lead sponsors - Senators Warner and Gardner, and Representatives Kelly and Hurd - deserve great credit for years of work on this important issue, and for guiding the bill over the finish line through an election, a global pandemic, and a divided Congress. As longtime supporters of the bill, Rapid7 <a href="/globalassets/_pdfs/policy/group-letter-re-iot-cybersecurity-improvement-act-093020.pdf">led group letters to Congress</a> urging passage, <a href="/globalassets/_pdfs/policy/iot-security-testimony---043019.pdf#page=8">testified</a> before the Senate favorably on the legislation, and <a href="/blog/post/2020/09/17/a-step-closer-to-stronger-federal-iot-security/">blogged</a> extensively on the bill’s <a href="/blog/post/2019/07/23/whats-happening-with-markups-for-the-iot-cybersecurity-improvement-act-of-2019/">progress</a>.  <br/></p><p>[For more detailed analysis of the bill, please check out this <a href="/blog/post/2020/09/17/a-step-closer-to-stronger-federal-iot-security/">post</a>.]<br/></p><p>The unanimous passage (in both House and Senate) of the IoT Cybersecurity Improvement Act demonstrates bipartisan recognition of the importance of IoT security, and the need for action. Through the Act, the federal government can lead by example in implementing basic IoT security standards and best practices for devices it buys and manages, and drive contractors’ adoption of standards-based coordinated vulnerability disclosure processes. We also note the bill’s careful alignment with existing standards and best practices [Sec. 4(a)(3)], which will aid coordination and efficiency.<br/></p><p>There is a lot more work ahead, and more opportunities for the security community to get involved. The Act directs NIST to issue standards-based guidelines for minimum security of IoT devices owned or controlled by the federal government [Sec. 4(a)], and federal acquisition rules and agency information security policies must be updated to be consistent with the NIST guidelines. [Sec. 4(b)-(d)] Similarly, NIST must develop coordinated vulnerability disclosure guidelines for agencies and contractors, who must then integrate the guidelines into their security practices. [Sec. 5-6] Many of these steps, rolling out in 2021, will include partnership and comments from security experts and practitioners.<br/></p><p>In addition to raising the bar for federal security, we hope the bill signals strengthened commitment from the US federal government to work on IoT security. US states (such as California and Oregon), and non-US countries (such as the UK, Australia, Singapore, and more) are making bold strides in establishing IoT security norms and mandates. While we support strong IoT security, we believe it is best implemented in a coordinated manner, avoiding a patchwork between US states or internationally. This will take sustained engagement from both the public and private sectors, but the passage of the IoT Cybersecurity Improvement Act and the lessons to be learned in its implementation will be invaluable to this process. <br/><br/><br/></p>]]></description>
      <link>https://www.rapid7.com/blog/post/2020/11/18/congress-unanimously-passes-federal-iot-security-law</link>
      <guid isPermaLink="false">blt421df7f0f0ca17fe</guid>
      <category><![CDATA[Public Policy]]></category>
      <category><![CDATA[Government]]></category>
      <category><![CDATA[IoT]]></category><dc:creator><![CDATA[Harley Geiger]]></dc:creator>
      <pubDate>Wed, 18 Nov 2020 18:18:34 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd6cdb923ec7324d8/683ddfccca9dfc537252664c/US-Capitol.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[A step closer to stronger federal IoT security]]></title>
      <description><![CDATA[<p><br/><em><strong>Update 11/18/20: </strong></em><em>The US Senate unanimously passed the IoT Cybersecurity Improvement Act. Our blog post detailing this is </em><a href="/blog/post/2020/11/18/congress-unanimously-passes-federal-iot-security-law/"><em>available here</em></a><em>.</em></p><p>On Tuesday September 15th, the US House unanimously passed the <a href="https://www.congress.gov/bill/116th-congress/house-bill/1668/text?q=%7B%22search%22%3A%5B%22HR+1668%22%5D%7D&amp;r=1&amp;s=1">IoT Cybersecurity Improvement Act</a> [H.R. 1668]. The bill, sponsored by Reps. Kelly and Hurd, would require federal procurement and use of IoT devices to conform to basic security requirements. The version passed by the House makes several improvements compared to previous versions and the Senate companion, which we blogged about in detail a long time ago in the parallel dimension that was 2019. Although the chances of Senate passage are unclear, the bill’s resounding approval in the House is a big step closer to a meaningful <a href="/fundamentals/what-is-internet-of-things-iot-security/">IoT security</a> framework across federal agencies.</p><h2>Bill summary<br/></h2><p>The House-passed version of the IoT Cybersecurity Improvement Act retains its basic formula: </p><ul><li>NIST must issue standards-based guidelines for minimum security of IoT devices owned or controlled by the federal government. [Sec. 4(a).]</li><li>The Office of Management and Budget (OMB) must issue rules requiring federal civilian agencies to have information security policies that are consistent with NIST’s guidelines. [Sec. 4(b).]</li><li>Federal acquisition rules must be updated to reflect the IoT security standards and guidelines. [Sec. 4(d).]</li><li>Federal agencies must implement a vulnerability disclosure policy, as well as contractors providing information systems to agencies. [Sec. 5-6.]</li><li>Federal agencies cannot procure, obtain, or renew contracts for IoT devices that cannot meet the security guidelines. [Sec. 7.] <br/></li></ul><p>Broadly speaking, this is pretty thoughtful and should have a meaningful impact on federal IoT security. Let’s zoom in on a few details: 1) The definition of IoT; 2) The waiver process; and 3) The contract amount threshold. <br/></p><h2>IoT Definition<br/></h2><p>We note the bill’s definition of IoT leverages NIST’s definition of IoT from NISTIR 8259. Here is that definition:<br/></p><p>Devices that have at least one transducer (sensor or actuator) for interacting directly with the physical world, have at least one network interface, and are not conventional Information Technology devices, such as smartphones and laptops, for which the identification and implementation of cybersecurity features is already well understood; and (B) can function on their own and are not only able to function when acting as a component of another device, such as a processor. [Sec. 4(a)(1).]<br/></p><p>This workable definition of IoT avoids some of the problems we flagged with the original bill, in which items like Programmable Logic Controllers were categorized as general computing devices. This is positive, as is the definition’s alignment with <a href="https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8259.pdf">NISTIR 8259</a>. Consistency is always A+. Although the definition would not cover disassembled components of an IoT device - such as commodity processors, actuators, sensors, etc. - this is understandable since it is literally a definition of “IoT <em>device</em>.” And while the components alone may not be covered by the proposed security rules for Iot devices, such as those established under Sec. 4(a)-4(b), they would be covered once they are assembled into a device and controlled or used by the agency.<br/></p><h2>Waiver process<br/></h2><p>In another positive development, this House-passed version of the bill improves upon the problematic waiver process we flagged in our previous blog post. The most recent Senate bill provides a waiver from the security requirements when the use of the IoT device is “appropriate to the function of the [device],” which blows a giant loophole into the bill by exempting (for example) smart light bulbs that are used as smart light bulbs. The House-passed version changes this up by allowing the waiver if the IoT “device is secured using alternative and effective methods appropriate to the function of [the] device.” [Sec. 7(b)(1)(C)] This approach is far more appropriate for the goals of the bill, and we hope the Senate makes a similar modification at the next available opportunity. <br/></p><h2>Contract amount threshold<br/></h2><p>Alas, not all is wine and roses. The bill includes a confusing provision that seems to limit the security requirements for IoT procurement to small-ish contracts. Specifically, Section 7(a)(2) states that the prohibition on procurement and use of IoT devices that do not meet the NIST security guidelines applies to contracts that are not greater than the “<a href="https://www.whitehouse.gov/wp-content/uploads/2020/03/M-20-18.pdf">simplified acquisition threshold</a>” - which is $750,000. <br/></p><p>At first glance, and also second glance, this looks like the procurement security requirements do not apply to IoT contracts over $750,000, which would be consequential considering the large size of many government purchases. However, staff close to the bill inform us that their intent is the opposite: The procurement security requirements <em>do</em> apply to contracts both above and below $750,000, and the “simplified acquisition threshold” needed to be called out separately to ensure that coverage. Fair enough, but the provision would benefit from a clarification on this point. <br/></p><h2>More federal leadership to come?<br/></h2><p>Let’s take a look at the bigger picture. By now, numerous assessments from Very Smart People conclude that the exploitability of IoT devices is a pressing global cybersecurity problem. To focus on the federal government’s own findings, behold the <a href="https://drive.google.com/file/d/1ryMCIL_dZ30QyjFqFkkf10MxIXJGT4yv/view#page=24">Cyberspace Solarium Commission</a> report, the <a href="https://www.commerce.gov/sites/default/files/2020-07/eo_13800_botnet_report_-_finalv2.pdf#page=15">report on automated threats</a> from the Departments of Commerce and DHS, and the <a href="https://www.nist.gov/system/files/documents/2016/12/02/cybersecurity-commission-report-final-post.pdf#page=30">Commission to Enhance the National Cybersecurity</a> report of yesteryear. Rapid7’s analysis of the security landscape concurs with such assessments, and - combined with our concern that basic IoT security best practices are well-known but still not broadly adopted - has led to our <a href="https://www.commerce.senate.gov/services/files/4EB7AFE6-75F0-4064-8DDA-BBA74596F911">stated position</a> that some regulation encouraging the adoption of baseline security measures <a href="/blog/post/2020/08/27/internet-of-things-cybersecurity-regulation-and-rapid7/">is appropriate</a>. <br/></p><p>Some federal agencies (notably <a href="https://www.fda.gov/regulatory-information/search-fda-guidance-documents/postmarket-management-cybersecurity-medical-devices">the FDA</a>) have taken action to demand basic security of the devices in their jurisdiction, and NIST is doing pretty fine work in establishing a voluntary minimum IoT security baseline. However, in general, the more cross-cutting and bold regulatory action on IoT security is being led by individual states (specifically <a href="https://leginfo.legislature.ca.gov/faces/billCompareClient.xhtml?bill_id=201720180AB1906">California</a> and <a href="https://www.oregonlaws.org/ors/646A.813">Oregon</a>) and non-US countries (such as the <a href="https://www.gov.uk/government/publications/proposals-for-regulating-consumer-smart-product-cyber-security-call-for-views">UK</a>), which are requiring devices to include a small subset of basic security protections. But at the federal level, Congress is at risk of being late to the game on the issue of IoT security, despite studying it a great deal.<br/></p><p>Passage of the IoT Cybersecurity Improvement Act in the House takes us a step closer to changing that, and enactment into law would go a long way to putting the US into a leadership position on this issue. Though the bill is narrowly focused on government use and procurement, it makes sense for the federal government to take the lead in raising the bar for devices it buys and manages. Leading by example may also jumpstart Congress’ process of exploring an appropriate IoT security regulatory framework for the private sector - one that is effectively consistent with industry best practices and heads off a patchwork of state laws.<br/></p><h2>One step at a time<br/></h2><p>Representatives Kelly and Hurd deserve hearty elbow-bumps for getting this over the finish line in the House. Senators Gardner and Warner, to their great credit, are also pushing to fast-track this bill in the Senate. Unfortunately, the legislative calendar is not too favorable as the election-pandemic-wildfire-recession year draws to a close, and failure to pass the bill would mean both the House and Senate must start over in 2021. </p><p>Nonetheless, the progress in the House this week boosts the chances for advancement in the Senate (in 2020 in 2021), which would be good news for federal agency security, cybersecurity writ large, and federal leadership on IoT security. <br/></p>]]></description>
      <link>https://www.rapid7.com/blog/post/2020/09/17/a-step-closer-to-stronger-federal-iot-security</link>
      <guid isPermaLink="false">blt747bb2cf5e86b652</guid>
      <category><![CDATA[Public Policy]]></category>
      <category><![CDATA[IoT]]></category>
      <category><![CDATA[Government]]></category><dc:creator><![CDATA[Harley Geiger]]></dc:creator>
      <pubDate>Thu, 17 Sep 2020 18:44:29 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt11255fb65c95e20c/683de16cda5c30e6b7a834f6/IoT.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Hackers On The Hill - Slides and recap on cybersecurity policy]]></title>
      <description><![CDATA[<p><br/></p><p>In advance of ShmooCon, Rapid7 co-organized the Hackers On The Hill event with the omnipresent Beau Woods of I Am The Cavalry. The event aims to help give security pros an opportunity to learn about engaging in public policy relating to cybersecurity. The event brought around 70 hackers to Capitol Hill to engage in meetings with Congressional offices, discuss cybersecurity policy issues of interest to the security research community, and provide resources and education on how to make policy advocacy more effective. It was a great event! A good turnout from the research community (in town for Shmoo), a beautiful room on the Hill secured with the help of Congressional staff, and lots of positive engagement in the meetings with Congressional offices towards the latter half of the day. Check out the <a href="https://hackersonthehill.org/">website</a> and <a href="https://twitter.com/HillHackers">Twitter handle</a> for more - here’s looking forward to doing it again in 2021. <br/></p><p>As part of that event, I gave a presentation on the state of cybersecurity policy, and produced a brief guide for visiting Congressional offices. Since then, I’ve received positive feedback and several requests to post the guide and the slides. So here we go. <br/></p><p>The <em>Unofficial Guide to Meeting With Congressional Offices</em> was a resource to participating hackers preparing for their first Hill meetings. We created a version specially for the event, but <a href="/globalassets/_pdfs/policy/an-unofficial-guide-to-meeting-with-congressional-offices---jan.-14-2020.pdf">here is an updated version</a> for you to use if you are interested in briefing Congress.<br/></p><p><a href="/globalassets/_pdfs/policy/hoth-2020.pdf">The <em>Hacking Policy</em> presentation is available here</a>. The presentation gave an overview of the volume and themes of cybersecurity policy activity at the federal and state levels, then focused on several specific cybersecurity topics - lovingly handpicked as possibly of interest to the hacker audience. Finally the presentation gave some resources for policy research and a few tips on effective advocacy. The slide graphics themselves are based on public domain government posters that I Photoshopped to be more cyber(<em>TM)</em> .<br/><br/></p><p><strong>Here is a brief summary of some takeaways from the </strong><em><strong>Hacking Policy </strong></em><strong>presentation:</strong><br/><br/></p><p>When looking at the cybersecurity policy landscape, it’s important not just to look at Congress (which often gets the most attention), but also Executive Branch agencies and the states. For many issues, agencies and states are more active.<br/><br/></p><p>Reviewing the past year, there is a lot of cybersecurity activity in Congress, executive agencies, and the states - hundreds of bills, regulations, and other actions that touch on cybersecurity in some way. Policymakers know that cybersecurity is an important issue - which was not necessarily the case five to ten years ago - the conversation has evolved to debate on what to do about cybersecurity.<br/><br/></p><p>While there is good diversity in the categories of cybersecurity policy issues under consideration, there are also common tensions holding back progress, such as fears of harming innovation with liability. <br/><br/></p><p>Taking a closer look at specific cybersecurity policy issues of interest to the security research community -<br/><br/></p><ul><li><strong>Internet of Things:</strong> In the current Congress, much of the action on IoT security relates to federal procurement (the IoT Cybersecurity Improvement Act), smart cities, and reports and commissions on how to approach IoT security. However, there are already many reports, best practices, and guidance about IoT security circulating - some of which comes from executive branch agencies. NIST is finishing its voluntary IoT security baseline, and sectoral regulators have released voluntary guidance on IoT within their jurisdiction (i.e., FDA for medical devices, NHTSA for cars, etc.). The states have galloped ahead with laws and legislation that would require baseline security requirements for IoT.<br/><br/></li><li><strong>Privacy:</strong><strong> </strong>The cybersecurity issues we watch out for here are 1) security requirements for personal information, 2) exemptions for cybersecurity activity from privacy requirements, and 3) the effect of preemption on state cybersecurity laws. Dozens of privacy bills in Congress have data security, but wrangling over enforcement and preemption are seriously stalling progress. Numerous states are also considering privacy legislation at varying stages of advancement, with California (again) and Washington likely to take action this year.<br/><br/></li><li><strong>Coordinated vulnerability disclosure:</strong> In Congress, only a couple bills include CVD - the IoT Cybersecurity Improvement Act would require it for government IoT vendors, and several bills would require specific federal agencies to incorporate bug bounties. The real action here is the executive agencies: OMB and CISA joined forces with a draft rule that would require all federal civilian agencies to have a vulnerability disclosure policy. Sectoral regulators, like FDA and NHTSA, are including CVD in voluntary guidance.<br/><br/></li><li><strong>Encryption:</strong><strong> </strong>Discussion about requiring government access to encrypted communications is beginning to surge again, with public statements from the Attorney General, the President, and senior Members of Congress. In December, Senate Judiciary hearings examined this question, with the Chairman and Ranking Member favorably inclined to restricting strong encryption. There is little current legislation on the subject, with the ENCRYPT Act protecting encryption and the draft EARN IT Act that could undermine it via a Commission report.<br/><br/></li><li><strong>Supply Chain:</strong> This issue is tied to, but not exclusively based on, concerns about 5G security and Chinese espionage. Congress is focused on the government’s own activity - such as making sure its procurement and subsidies have supply chain security requirements. Meanwhile, the Dept. of Commerce (tasked by Executive Order) is drafting a regulation restricting transactions with countries designated as adversaries, and the Dept. of Homeland Security is coordinating a task force on supply chain security that (among other things) is developing a framework for public-private information sharing on supply chain risk.<br/><br/></li><li><strong>CFAA / Computer crime:</strong><strong> </strong>Most legislation in this area would expand the reach of the Computer Fraud and Abuse Act and state equivalents, and there is very little movement on legal protection for security researchers. In particular, the International Cybercrime Prevention Act in Congress, and several computer crime laws proposed in states. Congress is also considering legislation requiring bug bounties for individual agencies, and modifying the CFAA to permit “hack back” by planting beacons in stolen data.<br/><br/></li><li><strong>DMCA Sec. 1201:</strong><strong> </strong>Some of the most productive conversations on legal protection for security research happen in this arena. Protection for security research under DMCA Sec. 1201 has made significant progress since the Librarian of Congress’ 2015 rulemaking. The rule is up for renewal every three years, with 2021 on schedule next. Agencies like DOJ and NTIA have weighed in positively with the Copyright Office on this issue. The Copyright Office issued a study in 2017 calling on Congress to change DMCA Sec. 1201 to give security researchers more flexibility. Congress has yet to take this up, but has begun a series of hearings on DMCA that may examine this issue in context of broader reform.<strong> </strong><br/><br/></li></ul><p>That’s a lotta cyber policy! But the status of cyber policy issues, legislation, and regulation is evolving all the time. Here are some additional resources if you want to track them: For federal legislation, check out &lt;https://www.congress.gov&gt;. For federal regulation, check out &lt;https://www.regulations.gov&gt;. For state legislation, check out &lt;https://www.ncsl.org&gt;. <br/><br/></p><p>As you go forth to advocate on issues that matter to you, remember that it is easy to just point out problems. The most valuable approach is to propose solutions that don’t create other big problems, articulate it to the right officials, and navigate the politics and processes to make progress on the solution. It’s not easy and takes practice, but I believe in the security community’s ability to make real change if we work together. <br/></p><p>*			*			*</p><p>Thanks again to everyone who came out to Hackers On The Hill 2020, and much gratitude to the participants and co-organizers. Hopefully we’ll run it back in 2021, and no doubt cyber policy will be even more cyber by then. Until that time, any feedback is welcome, and especially your experiences in advocating on cybersecurity policy since the event.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2020/02/14/hackers-on-the-hill-slides-and-recap-on-cybersecurity-policy</link>
      <guid isPermaLink="false">blt0ff0fda2256f6109</guid>
      <category><![CDATA[Public Policy]]></category>
      <category><![CDATA[Government]]></category><dc:creator><![CDATA[Harley Geiger]]></dc:creator>
      <pubDate>Fri, 14 Feb 2020 18:41:32 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt63053a1de337b711/683dea262a76862004bc8737/HOTH-2020.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[An update on trade]]></title>
      <description><![CDATA[<p>In light of recent activity on US trade agreements, here is a quick update on developments with regard to US-China, US-Mexico-Canada (USMCA), and US-Japan. This summary focuses on technology and cybersecurity-related issues affecting private enterprises. The trade agreements are lengthy, so absence of an issue should not be interpreted to mean it is not addressed in the agreement.</p><p><em>A couple top-level highlights:</em></p><ol><li>The China Phase One Agreement takes some steps to improve intellectual property enforcement and prohibit tech transfer requirements. This may reduce some risks of IP theft for businesses operating in China. However, it remains to be seen how stringently China will enforce the agreement.</li><li>The USMCA includes the first chapter dedicated to digital trade in a US trade agreement. It includes cybersecurity provisions encouraging Mexico and Canada to implement and promote a risk-based approach to cybersecurity that encompasses the principles of the NIST Cybersecurity Framework (without mentioning the NIST Framework by name). This can help cybersecurity products and services companies refer to a common set of practices and controls when building cybersecurity programs and assessing needs.</li></ol><p><strong>US-China Phase One Agreement</strong></p><p><em>Status:</em> The<a href="https://ustr.gov/countries-regions/china-mongolia-taiwan/peoples-republic-china/phase-one-trade-agreement"> US-China Phase One Agreement</a> was signed on Jan. 15, 2020. A partial rollback of tariffs has also been announced. The US-China Phase One Agreement will not require Congressional approval to enter into force. </p><p><em>Phase One Highlights:</em> Most of the agreement focuses on commodities rather than tech issues. However, there are provisions on IP, tech transfer, and purchase of services.<br/></p><p><u>Intellectual Property (Chapter 1):</u></p><ul><li>Expands the scope of liability for trade secret misappropriation to cover all persons, such as former employees, or "<a href="https://ustr.gov/sites/default/files/files/agreements/phase%20one%20agreement/Phase_One_Agreement-IP_Fact_Sheet.pdf">cyberhackers</a>."</li><li>China's legal system must prohibit electronic intrusions and breach of confidentiality as part of trade secret misappropriation.</li><li>Government requests for confidential business information must be limited to no more than what is necessary to exercise regulatory or investigative authority, and to prohibit unauthorized disclosures of that information.</li><li>Requires stronger penalties and injunctive relief for IP theft.</li><li>China must release an Action Plan within 30 days on how this chapter will be implemented.</li></ul><p><u>Tech Transfer (Chapter 2):</u></p><ul><li>Prohibits tech transfer as a requirement for market access, licensing, administrative approvals, or other special advantages. All tech transfers and licensing must be voluntary and by mutual agreement.</li><li>All administrative and licensing requirements must be transparent, and sensitive technical information must be protected in any administrative, regulatory, or review processes.</li><li>"Tech transfer" is not defined in the agreement. There are questions regarding whether these provisions apply to security assessments.</li></ul><p><u>Purchases (Chapter 6):</u></p><ul><li>China commits to dedicate $37.9bn to purchase of services, which may include "cloud and related services."</li></ul><p><em>Phase Two and cybersecurity:</em> US officials have <a href="https://www.reuters.com/article/usa-trade-china-mnuchin/phase-2-of-china-trade-deal-to-address-certain-tech-issues-u-s-treasury-secretary-idUSW1N26S01G">stated</a> that Phase Two will focus more on technology, IP, and cybersecurity issues - potentially including Huawei and rollback of additional tariffs. There is no public timetable yet, though President Trump noted that Phase Two would begin "very shortly." </p><p><strong>US-Mexico-Canada Agreement (USMCA)</strong></p><p><em>Status:</em> The<a href="https://ustr.gov/trade-agreements/free-trade-agreements/united-states-mexico-canada-agreement/agreement-between"> USMCA</a> was approved by the US Congress and entered into force on Jan. 16, 2020. Much of the content was borrowed from the now-defunct <a href="https://ustr.gov/sites/default/files/TPP-Final-Text-Electronic-Commerce.pdf">Trans-Pacific Partnership</a>. Unlike the China Phase One Agreement, USMCA is comprehensive and addresses several economic sectors, including a detailed chapter on digital trade (Chapter 19). This is the first digital trade chapter in a US trade agreement.  <br/></p><p><em>USMCA Digital Trade highlights:</em></p><ul><li><u>Cyber risk management:</u><em> </em>The Parties “shall endeavor to” employ and encourage enterprises to use risk-based approaches to cybersecurity, based on standards and best practices, to identify and protect against cybersecurity risks and to detect, respond to, and recover from cybersecurity events. Rapid7 <a href="/globalassets/_pdfs/rapid7-comments/cybersecurity-industry-letter-to-ustr-re-nafta-080917.pdf">fought for</a> inclusion of this provision in USMCA based on feedback that a common NIST-like framework would be helpful for communicating about cybersecurity in international markets.</li><li><u>Cybersecurity collaboration:</u> The Parties “shall endeavor to” strengthen collaboration mechanisms for cooperating to identify and mitigate cyberattacks and cybersecurity incidents.</li><li><u>No data localization:</u><em> </em>The Parties shall not require enterprises to locate or use computing facilities in that Party’s territory as a condition for conducting business there. The Parties may not restrict cross-border flow of information unless necessary to achieve specific purposes and in proportion to the risks.</li><li><u>Source code protection:</u><em> </em>The Parties shall not require access to or transfer of source code as a condition for market access.</li><li><u>No favorable treatment:</u><em> </em>The Parties shall not accord less favorable treatment to a digital product produced in another country.</li><li><u>No custom duties or fees:</u><em> </em>The Parties shall not impose custom duties or fees for digital products transferred electronically.</li><li><u>Safe harbor for platforms:</u> “Interactive Computer Services” (that provide electronic access by multiple users to a computer server) shall not be held liable for harms caused by user-generated content.</li><li><u>No weakening encryption:</u> With some caveats for financial instruments, the Parties shall not require local design elements (i.e., intentionally weakening) in commercial cryptography as a condition of market access.</li></ul><p><strong>US-Japan Digital Trade Agreement</strong></p><p><em>Status:</em> The<a href="https://ustr.gov/countries-regions/japan-korea-apec/japan/us-japan-trade-agreement-negotiations/us-japan-digital-trade-agreement-text"> US-Japan Trade Agreement</a> was signed by both countries on Oct. 7, 2019. This deal is more limited than USMCA, focusing largely on tariffs and digital trade. Because it is limited, the US-Japan Agreement <a href="https://crsreports.congress.gov/product/pdf/IF/IF11120">does not require congressional approval</a> to move forward. The digital trade chapter was broken out into a separate agreement - the US-Japan Digital Trade Agreement - and will be enacted in the US as an Executive Agreement. However, the Japanese Diet must still approve the Agreement.</p><p><em>US-Japan Digital Trade Agreement highlights:</em> The text is almost identical to the USMCA digital trade chapter. We should expect this to be the base negotiating text for digital provisions US trade agreements moving forward - including the upcoming US-UK, US-EU, and China Phase Two agreements.  <br/></p><p>    *		*		*</p><p>We welcome the inclusion of issues like information flows, IP protection, and cybersecurity into new trade instruments. Inclusion of these digital trade issues better reflect the technological environment of global businesses. As cybersecurity continues to grow in importance to industry, and as an industry itself, we hope future trade agreements and other instruments incorporate <a href="/globalassets/_pdfs/policy/rapid7-comments-to-ustr-re-us-eu-trade-agreement-121018.pdf">additional priorities</a> related to cybersecurity.  <br/></p>]]></description>
      <link>https://www.rapid7.com/blog/post/2020/01/28/an-update-on-trade</link>
      <guid isPermaLink="false">blt99128a01d46fa3d2</guid>
      <category><![CDATA[Government]]></category>
      <category><![CDATA[Public Policy]]></category><dc:creator><![CDATA[Harley Geiger]]></dc:creator>
      <pubDate>Tue, 28 Jan 2020 13:30:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd3bcd5b1c0b9f4e6/683de1282cfe3251b5dc1676/ecommerce-2140603_1920.jpg" medium="image" />
    </item>
  </channel>
</rss>