Microsoft has become the latest victim of the ever-widening SolarWinds-driven cyberattack that has impacted many federal agencies and tech targets. Microsoft president, Brad Smith, warned late Thursday to expect many more victims to come to light as investigations continue.
In a Thursday evening blog post (you should read it) Mr. Smith described the “broad and successful espionage-based assault” as “ongoing” and “remarkable for its scope, sophistication and impact.”
Microsoft President – Brad Smith further noted, “we should all be prepared for stories about additional victims in the public sector and other enterprises and organizations.”
To that point, he said that Microsoft has so far notified 40 of its security customers that it’s products have found indicators of compromise on their networks, and that the attackers targeted them “more precisely and compromised through additional and sophisticated measures,” with more victims to come.
Around 80 percent of those customers have been located in the United States, Smith said, with the remaining located in Canada and Mexico in North America; Belgium, Spain and the United Kingdom in Europe; and Israel and the UAE in the Middle East. They are government agencies, security and other technology firms, and non-governmental organizations.
As the scale of the cyber attacks on numerous US government departments and the private sector become more clear, it is obvious that the US federal government is at an extreme risk of a serious intrusion and is also an open door for espionage.
National security is literally at stake across a wide range of critical areas: 1) intelligence 2) infrastructure 3)military 4) bureaucratic operations.
The departments identified (so far) that have been breached are the Department of Treasury, The Department of Commerce, Department of Homeland Security, The Energy Department and most scary The National Nuclear Security Administration.
To compound the problem, the Cybersecurity and Infrastructure Security Agency, which has been helping to manage the federal response to the broad hacking campaign, indicated they were overwhelmed and might not be able to allocate the necessary resources to respond. Recently, the head of CISA had been fired for political reasons.
The root cause of the breach appears to be from two cyber security firms that were compromised by hackers. FireEye and SolarWinds both were identified as being catastrophically defeated.
To us at BLAKFX, the era of perimeter data security tools has long been over. When data security firms themselves are being used to compromise your data then a new way is needed.
Our Motto: In Math We Trust
The bottom-line is that the federal government is relying an outdated approach that still dominates data security products i.e. that we must build a perimeter to defend against data theft. This is old thinking and as demonstrated, hackers can breach just about any perimeter and now can use those same products to compromise their clients. American National Security cannot depend on outdated data security.
What is needed is a better approach to data security. Perimeter products that try to keep hackers out will all eventually be breached. Fanaticism on identification through bio-metrics, password managers or 2FA are only as secure as the person entrusted to follow the protocol. As we all have learned, the human error component can always be breached. In the near future, when quantum computing becomes more mainstream, products that rely on TLS-based encryption will be instantly obsolete.
The only solution is for data security products that actually protect the data itself.
BLAKFX has delivered. The Helix22 data security SDK protects all data at rest, in use and in transit. Review Helix22 API, examples and documentation on our GIT
BLAKFX Military advisor, Major General (Ret) Stephen T Sargeant
CEO of Marvin Test Solutions
BLAKFX delivers all this security assurance very confidently due to our genius engineering team spearheaded by Robert Statica and Alex Maslov who have invented a new model for data security that required an innovative look at the problem. As mentioned, the approach we took was to protect the data itself. Almost all other data security products try to build a perimeter or being fanatic on user identification. However, once the product is breached or a password is stolen, your firm/nations data is in the clear.
You see, our cryptography is embedded with the data itself through our inventive and patented process of DNA BindingTM. Therefore, even if a breach were to occur the data cannot be exfiltrated. This means that all your firm/nations data is 100% protected regardless of the type of attack. Further, Helix22 protects data at rest, in use and in transit. No other data security can make that claim. Artificial Intelligence and Machine Learning experimentation runs and generates incalculable amounts of data. All is protected at its inception.
Our patented DNA BindingTM cryptography is what enables our low, low latency. As the encryption is with the data, there is no need to create the large packets required in RSA.
We can make this claim as the tech engineers at BLAKFX invented and patented a genuine user2user (U2U) encryption. We manage data security transmission through the truly brilliant and also patented universal Helix22 key service. The encryption originates on your network or device, not just when the app is opened. This means, that when data arrives to our key server, it is already encrypted so all it needs to do is issue another key. Signal and Telegram cannot claim this level of security. This key will then only work with the intended device, which generates a matching key required to open the data. In this protocol, we are truly a “zero-knowledge” server so your communications and transmissions remain completely top secret. Even in the event that BLAKFX were subpoenaed, we can honor the request by just handing over the encrypted content…as that is literally all we have. Helix22 also only use keys just one-time and then destroys them. This way the data security is future forward prefect. Therefore, in our unique user-to-user encryption (U2U) world, there is no opportunity at all for any data leak.
This same protocol just described, can be the same with all your 3rd party vendors and suppliers. It does not matter in the least what platform they are running or what device they are using or even the type of data, it is all 100% protected. We do however, strongly advise that all firms involved be utilizing Helix22 due to the nature of the data content. Helix22 can ensure that whatever data they are generating is protected as well.
Let’s take it a step further. Even if your organization were a victim of an internal attack or a victim of malicious open source downloads, there is no reason for concern. Any data that has been forwarded, downloaded, copied or saved cannot be exfiltrated. Period. We have the technology industries foremost data packets which are protected with multi-layered, military grade encryption algorithms that have already proven the ability to withstand penetration testing from MI5 and quantum computing attacks.
One final practical genius of DNA BindingTM is in that it is immediately compatible with whichever system or software you are utilizing. Therefore, any organization can forward information to another and then discuss it and there is immediate privacy.
BLAKFX is Based on Proven Success
Our founders, Robert Statica PhD and Kara Coppa, also founded Wickr, which is used by the US military and has never been hacked since its inception in 2012. The Helix22 data security SDK is several generations enhanced since then. Dr. Statica also delivered the encryption for the world’s most secure phone, Katim.
Founder – Robert Statica PhD Founder – Kara Coppa Founder – Alex Maslov MS, MBA
Co-Founders of Wickr KatimTM Ultra Secure Smartphone
Finally, our encryption is quantum computing ready so no need to redo all your data security methodologies in a couple of years when everything else becomes obsolete.
We like to refer to BLAKFX as “22nd Century Data Security.”