Only this month, there were more stark warnings about further hacks (Photo: European Commission)
It may have been slightly embarrassing for the EU when on 29 March the Hungarian news site Direkt 36 made known how the Hungarian foreign affairs ministry had been hacked for several months since December 2021 by Russian intelligence, a few days after the European Commission proudly announced it had strengthened cybersecurity with a new set of measures to harden the networks of the EU bodies against penetration.
Since the Hungarian connection potentially compromised the sensitive communication channels with Brussels, the incident is yet another painful demonstration of how fragile cybersecurity really is.
This incident is not an isolated one (the hacking of the Spanish prime minister is another prominent recent example) and I’m sure many more similar incidents have gone unreported.
Indeed, only this month, there were further stark warnings about further hacks.
It is against that backdrop that the EU Commission released a new Cybersecurity Regulation on 22 March, which intends to improve its institutions’ “governance, risk management and control in the cybersecurity area”.
This includes a new inter-institutional cybersecurity board, boosting cybersecurity capabilities and maturity assessments and better cyber-hygiene. More importantly, the mandate of the Computer Emergency Response Team (CERT-EU) will receive additional responsibilities for threat intelligence, information exchange and incident response coordination. These new rules add to existing initiatives to improve the EU’s cybersecurity as facilitated by Enisa, the European Information Security Agency.
But the Hungarian hacking, which allowed the Russian intelligence services to read over the shoulder of an EU member state for an extended period of time, proves that cybersecurity is as networked as ever, and needs to be ensured far beyond the institutions and agencies of the EU itself.
It requires more incisiveness than is likely to be achieved by an inter-institutional board, which on the surface sounds like little more than yet another bureaucratic layer on top of the rest and a parallel with Enisa.
The EU and its members are increasingly dependent on digital infrastructure. This entails huge risks for severe disruption if this interconnectedness is compromised.
Whereas the usual cyberattacks naturally involve the theft of the EU’s political and economic confidential information, the ongoing war in Ukraine could bring about more crippling cyber offensives.
The past months have revealed cyberattacks of varying size, prowess and success against digital communications, critical infrastructure, and even satellites. The EU and the world are at the dawn of a new digital era, wherein 5G and beyond, AI, quantum computing, intelligent drones, nanotechnologies, and concomitant innovations will enable a true Internet of Things that connects all devices but at the same time exposes those connections to great risk.
The question, therefore, remains what further steps need to be taken to enable a safe and secure digital environment.
Enisa’s initiatives definitely lead to positive developments and awareness; however, they usually involve the creation of bureaucratic layers and procedures, and focus on incentivising without enforcing. New paradigms will be required to detect and defend against new attempts at exploiting our connectedness and mitigating their effects, and in this regard, the EU can learn a lot from its partners.
As a Nato powerhouse, the US remains the world’s most capable cyber state in defensive, offensive and intelligence capabilities, thanks to decades of significant investment and clear political direction, and more could be done to share techniques with EU allies. Other examples include the United Arab Emirates which, driven in part by the sharp increase in cyberattacks, has become a strong regional cyber power.
Its strategy has included getting help from cyber experts, such as Amazon Web Services and Deloitte, to help upskill local staff in technology — a technique which EU states should also embrace further with the right partners.
While there are key differences in how offensive cyber capabilities are assessed, in order to counter the threat of authoritarian powers, as members of Nato, many EU states could also look to further enhance their offensive cyber capabilities to avoid being outmanoeuvred by China and Russia’s heavy investment in this area.
However, the difficulty for the EU is that it is not an individual nation but the combination of 27 cybersecurity policies and mentalities, and hence will have to seek a way of overcoming the divisions this entails.
‘To Do’ list
To do this, the EU should enhance cybersecurity around three key elements: improving situational awareness, reducing the attack surface through coordinated countermeasures, and enforcing standards.
The EU is excellently placed to do all three, but standards will have to become stricter and be enforced rather than incentivised. Provided the CERT-EU will be given the capacity to process the incoming data, the incentives could include sanctions for not meeting the requirements, helping ensure the gravest incidents are prosecuted and having the EU set its considerable economic power against states that harbour cyber criminals.
Setting these capabilities up are not just technical, but also organisational challenges. Cybersecurity is not set up in isolation — it is as holistic and decompartimentalised as possible.
But cybersecurity can only be as strong as its weakest link.
Source: euobserver.com