Thursday

26th Apr 2018

EU cyber assault would cost €86 million, expert says

  • A technician overlooks EU air traffic at Eurocontrol, the Brussels-based European air safety body - a potential target in any cyber assault (Photo: Eurocontrol)

A malicious foreign power could - given €86 million, 750 people and two years to prepare - launch a devastating cyber attack on the EU, a US security expert has said.

The assault would begin with a member of staff at, say, the London Stock Exchange or the French electricity grid operator, RTE, opening a PDF attachment in an email which looks as if it had been sent by a colleague.

Thank you for reading EUobserver!

Subscribe now for a 30 day free trial.

  1. €150 per year
  2. or €15 per month
  3. Cancel anytime

EUobserver is an independent, not-for-profit news organization that publishes daily news reports, analysis, and investigations from Brussels and the EU member states. We are an indispensable news source for anyone who wants to know what is going on in the EU.

We are mainly funded by advertising and subscription revenues. As advertising revenues are falling fast, we depend on subscription revenues to support our journalism.

For group, corporate or student subscriptions, please contact us. See also our full Terms of Use.

If you already have an account click here to login.

The PDF would contain software enabling a hacker on a different continent to silently take over his computer. Over time, the hacker would monitor the employees' keystrokes, sniff out passwords, and use the information to take over computers higher up the command chain, eventually putting him in a position to switch off the target's firewalls, leaving it open to DOS (Denial of Service) attacks, and to install RATs (Remote Administration Tools), which control its hardware.

Around 18 to 21 months down the line, with enough targets compromised, the assault could take place.

The EU 27 countries would wake up to find electricity power stations shut down; communication by phone and Internet disabled; air, rail and road transport impossible; stock exchanges and day-to-day bank transactions frozen; crucial data in government and financial institutions scrambled and military units at home and abroad cut off from central command or sent fake orders.

Normal life could be restarted in a few days' time. But the damage done to administrative capacity, consumer confidence and the economy by loss of vital data would last years.

Charlie Miller, a mathematician who served for five years at the US' National Security Agency stress-testing foreign targets' computer systems and designing "network intrusion detection tools," calculated the EU scenario on the basis of a more detailed study of US vulnerability.

Mr Miller said the bulk of the money, €83 million, would be used to pay an army of 750 hackers, with just €3 million spent on hardware - a testing lab with 50 computers, another two computers each per hacker and assorted smartphones and network equipment.

An elite corps would consist of 20 "world class" experts whose main job would be to find "0-day exploits" - previously undetected security gaps in popular software such as Windows, Java or Adobe. The experts would have to be paid a small fortune, over €200,000 each a year, or extorted.

Another 40 people, drawn from the enemy country's secret services or recruited inside EU member states, would get inside "air-gapped" facilities - the most secure targets, such as military command structures or air traffic control bodies, which are physically cut-off from the Internet in order to prevent cyber attacks. When the time came, the agents would un-airgap targets by connecting them to the Internet via 3G modems and satellite phones.

The rest of the cyber army, 690 people, mostly computer science graduates and post-graduates from inside the hostile state, would use the 0-day exploits to take over target networks. They would also collect, maintain, create and test "bots" - software which secretly uses computers in ordinary people's homes to run automated tasks, such as DOS attacks, which bombard target systems with overwhelming amounts of data. The final assault would require 500 million bots in diverse locations.

Dr Miller, who currently works for the Baltimore, US-based company, Independent Security Evaluators, admitted that Internet scare stories help firms like his to get business. But he noted that classic intelligence gathering, rather than hiring IT experts, is the best line of defence.

"It's really hard to defend against an attack that's well equipped and carried out by smart people. But you do have years to detect it before it happens. If you have an elaborate intelligence gathering network you could detect it, not technically because you can see it, but because you have human intel," he said. "If you want to spend your money well, spend it on your intelligence services."

Learning from Estonia

The threat of cyber war against EU targets became a reality on 27 April 2007 when hackers crashed Estonian online news agencies with DOS attacks in the middle of an Estonia-Russia political dispute.

The assault gathered pace over the next three weeks disrupting online banking services and government communications. Three and a half years down the line there is no hard evidence linking the attack to a foreign power, although activists in the pro-Kremlin youth group, Nashi, claim to have taken part.

"If these cyber attacks were used to test the Estonian cyber defense capabilities, much more sophisticated attacks could possibly follow, based on the knowledge acquired during the attacks," a report on the 2007 events by the Estonian government's Computer Emergency Response Team said.

Nato and EU countries are putting more resources into joint cyber-security projects.

Liisa Tallinn, a spokeswoman for Nato's Tallinn-based Co-operative Cyber Defence Centre of Excellence (CCDCOE), told this website that Turkey and the US are "about to" send staff to join personnel from its eight current participating countries - Estonia, Germany, Hungary, Italy, Latvia, Lithuania, Slovakia and Spain.

The CCDCOE in May ran a "Baltic Cyber Shield" exercise in which a "red team" of "friendly hackers" took on a "blue team" of defenders to try and disable factories and communications infrastructure. Part of the results will be made public in September.

'Like water out of the tap'

The EU's own cyber-security unit, the Crete-based European Network and Information Security Agency (Enisa), will in late October or early November carry out the first ever pan-EU cyber security exercise. Enisa spokesman, Ulf Bergstrom, said the exercise will look at disrupting normal Internet operations in the EU's internal market and the way EU member states' authorities co-operate across the union's internal borders.

Mr Bergstrom noted that Enisa's initial mandate, which covers security of ecommerce, online banking and mobile phones, is being expanded to cover cyber-criminality.

"We have been given political signals, for example by [information society] commissioner Neelie Kroes, to work more closely with agencies like Europol and Interpol," he said. "Cyber security is vital for the economy of Europe, to protect the businesses and operations of ordinary citizens. This is the digital society that we take for granted, like water out of the tap, which we need to defend."

The original text quoted Liisa Tallinn as saying France is about to join the CCDCOE. This quote was incorrect, as she did not mention France

EU shelves Macron idea for 'European Darpa'

The European Commission's new strategy on artificial intelligence contains nothing that resembles French president's idea for a US-inspired agency for disruptive innovation.

News in Brief

  1. UN expects over $4bn in pledges for Syria
  2. Commission wants more public data made available for reuse
  3. Study: Brexit will hit all European farmers
  4. European media face rise in 'verbal violence' from politicians
  5. Greenland PM to keep power despite poll slump
  6. Commissioner optimistic on FYROM name solution
  7. Italian court keeps NGO migrant rescue boat docked
  8. German Jews warned not to wear skullcap in public

Stakeholders' Highlights

  1. Sustainable Energy Week 2018"Lead the Clean Energy Transition"- Register and Join Us in Brussels from 5 to 7 May
  2. EU Green Week 2018Green Cities for a Greener Future. Join the Debate in Brussels from 22 to 24 May
  3. Nordic Council of Ministers12 Recommendations for Nordic Leadership on Climate and Environment
  4. Macedonian Human Rights MovementOxford Professor Calls for an End to the Anti-Macedonian Name Negotiations
  5. ACCAPeople Who Speak-Up Should Feel Safe to Do So
  6. Mission of China to the EUProgress on China-EU Cooperation
  7. Nordic Council of MinistersWorld's Energy Ministers to Meet in Oresund in May to Discuss Green Energy
  8. ILGA EuropeParabéns! Portugal Votes to Respect the Rights of Trans and Intersex People
  9. Mission of China to the EUJobs, Energy, Steel: Government Work Report Sets China's Targets
  10. Martens CentreJoin Us at NET@WORK2018 Featuring Debates on Migration, Foreign Policy, Populism & Disinformation
  11. European Jewish CongressKantor Center Annual Report on Antisemitism Worldwide - The Year the Mask Came Off
  12. UNICEFCalls for the Protection of Children in the Gaza Strip

Latest News

  1. Whistleblowers could be enforcers of rule of law in Europe
  2. EU shelves Macron idea for 'European Darpa'
  3. Don't play EU 'games' with military HQs, Italian admiral says
  4. EU had a plan for Jordan - now it's time to make it work
  5. Time for EU to take charge of global health research agenda
  6. EU in race to set global Artificial Intelligence ethics standards
  7. Juncker delays air quality action due to busy agenda
  8. Spain makes bid for EU naval HQ

Stakeholders' Highlights

  1. Mission of China to the EUForeign Minister Wang Yi Highlights Importance of China-EU Relations
  2. Nordic Council of MinistersImmigration and Integration in the Nordic Region - Getting the Facts Straight
  3. Macedonian Human Rights MovementMacedonians in Bulgaria Demand to End the Anti-Macedonian Name Negotiations
  4. Counter BalanceThe EIB Needs to Lead by Example on Tax Justice
  5. ILGA EuropeTrans People in Sweden to be Paid Compensation for Forced Sterilisation
  6. International Partnership for Human RightsThe Danger of Standing Up for Justice and Rights in Central Asia
  7. Mission of China to the EUChina and EU Must Work Together to Promote Global Steel Sector
  8. Swedish EnterprisesEU Tax Proposal on Digital Services Causes Concern for Small Exporting Economies
  9. European Jewish CongressCondemns the Horrific Murder of Holocaust Survivor Mireille Knoll in Paris
  10. Mission of China to the EUAn Open China Will Foster a World-Class Business Environment
  11. ECR GroupAn Opportunity to Help Shape a Better Future for Europe
  12. Counter BalanceControversial Turkish Azerbaijani Gas Pipeline Gets Major EU Loan

Stakeholders' Highlights

  1. World VisionSyria’s Children ‘At Risk of Never Fully Recovering', New Study Finds
  2. Macedonian Human Rights MovementMeets with US Congress Member to Denounce Anti-Macedonian Name Negotiations
  3. Martens CentreEuropean Defence Union: Time to Aim High?
  4. UNESDAWatch UNESDA’s President Toast Its 60th Anniversary Year
  5. AJC Transatlantic InstituteAJC Condemns MEP Ana Gomes’s Anti-Semitic Remark, Calls for Disciplinary Action
  6. EPSUEU Commissioners Deny 9.8 Million Workers Legal Minimum Standards on Information Rights
  7. ACCAAppropriate Risk Management is Crucial for Effective Strategic Leadership
  8. EPSUWill the Circular Economy be an Economy With no Workers?
  9. European Jewish CongressThe 2018 European Medal of Tolerance Goes to Prince Albert II of Monaco
  10. FiscalNoteGlobal Policy Trends: What to Watch in 2018
  11. Human Rights and Democracy NetworkPromoting Human Rights and Democracy in the Next Eu Multiannual Financial Framework
  12. Mission of China to the EUDigital Cooperation a Priority for China-EU Relations