[1]DHS vulnerability scanning program offline after Virginia office
loses power:
Two cybersecurity programs the Department of Homeland Security
offers both states and the private sector have been temporarily
knocked offline due to a power outage, while other services have
been shifted to backup locations, multiple sources tell CyberScoop.
The National Cybersecurity and Communications Integration Center
(NCCIC), the 24/7 hub for monitoring cyberthreats across the
government and critical infrastructure, has shifted operations to a
backup location in Florida. The move was made after the Arlington,
Virginia, building that houses NCCIC lost power last week due to
heavy rains.
Additionally, two other programs under NCCIC's National
Cybersecurity Assessments and Technical Services (NCATS) - Cyber
Hygiene vulnerability scans and Phishing Campaign Assessment - have
been offline since July 26.
The Cyber Hygiene program remotely detects known vulnerabilities on
internet-facing services. The Phishing Campaign Assessment program
is part of a remote penetration testing service. Both programs are
used by hundreds of customers across the country. Thirty-four states
have received vulnerability scans through the Cyber Hygiene program,
[2]according to a DHS presentation given at the National Association
of State Election Directors summer conference.
DHS Assistant Secretary for Cybersecurity and Communications
Jeanette Manfra told CyberScoop that the disruption to Cyber Hygiene
is temporary, and that election systems will be the first to resume
service once the program comes back online. Officials expect scans
to resume Aug. 6.
The building housing NCCIC suffered heavy damage on when portions of
the façade ruptured due to the volume of rain that fell in the
Washington, D.C., region. The roof of a restaurant on the building's
ground level failed during business hours on July 26.
… A number of DHS offices are in that building.
CyberScoop has learned that due to the water damage, the building
completely lost power, which prevented server rooms used by DHS from
staying cool. Once the room reached a certain temperature, a
sprinkler system was activated. Those sprinklers damaged servers
supporting the Cyber Hygiene and Phishing Campaign Assessment
programs.
On Sunday, the NCATS office sent an email to its customers informing
them that Cyber Hygiene and Phishing Campaign Assessment were
offline and that contingency plans have been put in place.
"In order to minimize the operational impact, we immediately
implemented our contingency plans and transferred functions to other
sites, including NPPD's facility in Pensacola, Fla.," the email,
obtained by CyberScoop, reads. "We are working to restore these
services as quickly as possible. We will let you know when the
service and reports will resume."
NPPD is the National Protection and Programs Directorate, which
oversees NCCIC.
…
The power outage has had a "minimal impact" on DHS's cybersecurity
operations, Krebs said. The incident has not, for example, affected
the department's ability to respond to cyber incidents or issue
warnings to the private sector.
…
DHS has been at the center of the federal government's efforts to
fortify U.S. voting infrastructure following the 2016 presidential
election, when Russian hackers probed systems in 21 states. Last
week it was revealed that the same outfit of Russian hackers that
meddled in the 2016 election appears to have targeted [3]Sen. Claire
McCaskill's office.
(Via [4]Cyberscoop)
With the DHS looking to create a central Risk Management program,
seeing stories like this does not instill confidence that the U.S.
Government, and the DHS in particular, are up to the challenge.
This slays me:
Chris Krebs, the undersecretary of NPPD, told CyberScoop that the
department is "taking this opportunity to get some efficiencies into
the system, but also to build resilience and redundancy."
Those are the words uttered after every such event.
By the way for those not in the know, there is a well-known process
call Disaster Recovery and Business Continuity Planning (DR/BCP) that
has been around for decades to plan for just this sort of event.
Also on:
[5]Twitter
__________________________________________________________________
My original entry is here: [6]DHS vulnerability scanning program
offline after Virginia office loses power. It posted Thu, 02 Aug 2018
06:33:00 +0000.
Filed under: business,
References
1.
https://www.cyberscoop.com/dhs-scans-offline-nccic-backup-flood-damage/
2.
https://www.nased.org/s/GCC-Update_Hale-and-Kolasky_July-2018.pdf
3.
https://www.cyberscoop.com/russian-hackers-targeted-2018-reelection-campaign-vulnerable-democrat/
4.
https://www.cyberscoop.com/feed/
5.
https://twitter.com/TokyoGringo/status/1024908743975333893
6.
https://www.prjorgensen.com/?p=1371