The National Testing Institute for Cybersecurity NTC published legal advice on Monday that shakes people up and notes: According to this, hackers with good intentions and subject to certain preconditions can penetrate third-party computer systems that are protected against access.
The intrusion is not done with criminal intent, but with the motivation to expose existing vulnerabilities and increase IT security. In the professional world this is called ethical hacking assigned.
NTC test manager Tobias Castagna explains to Watson that a team of internal and external cybersecurity experts will increasingly carry out such attacks. On its own initiative. Without warning.
The NTC especially wants to look at digital products and technical infrastructures “that have not been tested or have been insufficiently tested”. Test manager Castagna confirms that an internal list of specific “targets” already exists.
According to the NTC report, these are primarily “widespread, critical, alternative and official systems”. Namely those who “appear to be at risk based on objective evidence”, for example because there are indications that there are security vulnerabilities in a system.
The NTC test manager understandably does not disclose who the white hat hackers will be hacking in the coming weeks and months.
IT security gaps are known to exist all over the economy, in small and medium-sized enterprises (SMEs), as well as large enterprises. Another potentially valuable target for cybercriminals is state institutions, whether at the municipal, cantonal, or federal level.
A lot.
As is well known, cyber-attacks by professional, mostly Russian-speaking ransomware gangs are among the biggest risks for local companies.
NTC test manager Castagna explains:
Even when ethical hacking is done correctly, the organizations involved run the risk of reputational damage. For example, through false or exaggerated reporting in the media or on social media platforms.
Watson therefore asked what the internal decision-making process at the NTC looks like, whether and how people are publicly informed about a successful attack.
NTC Test Lead Castagna explains that reporting vulnerabilities has three purposes:
When publishing the security gaps, the NTC will adhere to its own “Vulnerability Disclosure Policy,” explains test manager Castagna. «We plan to make the relevant publications on our website. This is equally accessible to everyone.”
“For a detailed publication, the identified and documented security gaps must be completely eliminated,” the legal opinion states.
The NTC test leader explains:
Apparently this cannot be ruled out.
NTC test manager Castagna emphasizes:
Companies responsible for the power supply and other socially indispensable services invest an above-average amount of money in cybersecurity: citizens count on that.
NTC Test Leader Castagna:
The American companies Apple, Google (Alphabet) and Microsoft operate the largest and most important platforms from a consumer perspective: iOS/iPadOS/macOS, Android, Windows.
Watson therefore wanted to know from the NTC what role these platform operators play in the ethical hacking project. Will the NTC ensure that things are fairly evenly distributed by operating system/platform?
As explained above, ethical hacking involves detecting gaps in IT security without the explicit order and consent of those involved. Spicy: According to Swiss law (keyword “hacker article”), even the attempt to penetrate a secured IT system is punishable.
If Swiss law is violated “in the context of vulnerability assessments”, a hacker can do so under certain circumstances the justifiable state of emergency according to Article 17 of the Criminal Code (StGB) appointed, the notification of the report states.
From the Walder Wyss business law firm in Zurich, according to “Bilanz” one of the country’s leading law firms.
The firm’s lawyers recently had a much more well-known client: Credit Suisse (CS). According to the “Handelzeitung”, residents of Zurich were responsible for providing legal advice in the CS warehouse.
The National Test Institute for Cybersecurity NTC is a non-profit organization based in the city of Zug, which cooperates with government agencies, research institutes and private companies. It was founded in 2020 on the initiative of the canton of Zug. The NZZ called it “Cyber-Empa”.
The internal and external experts examine “digital products and infrastructures that are not or insufficiently controlled by the private sector”.
One of the first clients was a federal government, the National Center for Cyber Security (NCSC): In 2021, the experts of the NTC checked the functionalities and security of the Swiss Covid certificate system.
Unlike the Federal Materials Testing and Research Institute (Empa), the NTC does not conduct product certifications. And to avoid a conflict of interest, testing is not done on behalf of product manufacturers.
Source: Watson
I’m Ella Sammie, author specializing in the Technology sector. I have been writing for 24 Instatnt News since 2020, and am passionate about staying up to date with the latest developments in this ever-changing industry.
On the same day of the terrorist attack on the Krokus City Hall in Moscow,…
class="sc-cffd1e67-0 iQNQmc">1/4Residents of Tenerife have had enough of noisy and dirty tourists.It's too loud, the…
class="sc-cffd1e67-0 iQNQmc">1/7Packing his things in Munich in the summer: Thomas Tuchel.After just over a year,…
At least seven people have been killed and 57 injured in severe earthquakes in the…
The American space agency NASA would establish a uniform lunar time on behalf of the…
class="sc-cffd1e67-0 iQNQmc">1/8Bode Obwegeser was surprised by the earthquake while he was sleeping. “It was a…