Cloudibn News

Be updated with Technology

  • BIG Data & Analytics
  • CLOUD
  • Data Center
  • IOT
  • Machine Learning & AI
  • SECURITY
  • Blockchain
  • Virtualization
You are here: Home / SECURITY / Nation-state cyber attacks double in three years

Nation-state cyber attacks double in three years

April 8, 2021 by cbn Leave a Comment

Nation state-backed cyber attacks are becoming more widespread, varied and open than ever before, with the number of significant incidents doubling between 2017 and 2020, according to the University of Surrey’s senior lecturer in criminology, Mike McGuire, who argues that the world is moving closer to a point of advanced cyber warfare than at any time since the inception of the internet.

In a newly released study sponsored by HP Inc, McGuire analysed more than 200 cyber security incidents linked to nation-state activity in the past 11 years, drawing on first-hand intelligence gathering from informants active on the dark web, and consultation with a panel of experts in cyber security, intelligence, government, law enforcement and academia. The report paints a concerning picture of escalating tensions supported by complex structures that tightly intersect with the underground cyber criminal economy, the so-called “Web of Profit”.

Among the study’s key findings was a worrying escalation in international tensions during 2020, with a majority of study participants saying the Covid-19 pandemic had proved a significant opportunity for nation states to exploit. Among other things, nation states are increasingly trying to acquire Covid-19-related intellectual property (IP) data, such as information on vaccines.

“When we look at nation-state activity through the lens of this report, it comes as no surprise that we have seen such an escalation over the past year – the writing has been on the wall for some time,” said McGuire.

“Nation states are devoting significant time and resources to achieving strategic cyber advantage to advance their national interests, intelligence-gathering capabilities and military strength through espionage, disruption and theft.

“Attempts to obtain IP data on vaccines and attacks against software supply chains demonstrate the lengths to which nation states are prepared to go to achieve their strategic goals.”

The study also identified a rise in supply chain attacks, up 78% in 2019 – with nearly 30 distinct supply chain attacks taking place between 2017 and 2020 that have a possible link to nation-state actors – the SolarWinds incident might be thought a good example of this. Also, more than 40% of the incidents analysed now had some element of hybridisation in that they involve a physical attack on assets as well as a digital one – attacks on critical national infrastructure (CNI) would fall into this category.

Ian Pratt, global head of personal systems security at HP, said: “Nation-state conflict doesn’t take place in a vacuum – as evidenced by the fact that enterprise is the most common victim within those attacks analysed.

“Whether they are a direct target or a stepping-stone to gain access to bigger targets, as we have seen with the upstream supply chain attack against SolarWinds, organisations of all sizes need to be cognisant of this risk. As the scope and sophistication of nation-state attacks continues to increase, it is vital that organisations invest in security that helps them stay ahead of these constantly evolving threats.”

The study found that governments that act maliciously in cyber space are increasingly using tactics that have already been road-tested by organised criminals. Government-backed actors also seem to be stockpiling zero-day vulnerabilities, and 10-15% of dark web vendor sales are now to atypical purchasers, or brokers for governments.

In other instances, offensive cyber tools developed by government agencies are making their way onto the black market – most famously the EternalBlue exploit used in the WannaCry attacks. About one-fifth of government-backed attacks were found to use custom-made weaponry such as targeted malware probably developed in-house, but about half involved easy-to-buy, straightforward tools bought on the dark web.

“Cyber crime economies are shaping the character of nation-state conflicts,” said McGuire. “There is also a ‘second generation’ of cyber weaponry in development that draws upon enhanced capabilities in computing power, AI [artificial intelligence] and cyber/physical integrations. One such example is ‘Boomerang’ malware, which is ‘captured’ malware that can be turned inward to operate against its owners.

“Nation states are also developing weaponised chatbots to deliver more persuasive phishing messages, react to new events and send messages via social media sites. In the future, we can also expect to see the use of deepfakes on the digital battlefield, drone swarms capable of disrupting communications or engaging in surveillance, and quantum computing devices with the ability to break almost any encrypted system.”

To ease rising tensions and prevent nation states from being drawn into more hostile cyber attacks, 70% of the expert panel said they thought some kind of international treaty would ultimately be necessary – this is by no means a new idea – but just 15% of them thought a cyber convention would be agreed on this decade, 37% said it was more likely to come in the 2030s, and 30% said it would probably never happen.

McGuire said a cyber peace treaty would depend on both scope and consensus. “Any treaty would need to specify the parties included, the range of jurisdictions involved and the activity it would cover,” he said.

“Nation states also need to agree on the principles that would shape any cyber treaty, such as weapons limitation. But these factors can be hard to define and achieve – just look at the recent proposal for a cyber crime treaty put to the UN. While the proposal did pass, 60 members voted against it and 33 abstained. A lack of international consensus would make any cyber treaty unlikely to succeed.”

Share on FacebookShare on TwitterShare on LinkedinShare on Pinterest

Filed Under: SECURITY

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • May 2015

Recent Posts

  • Tigera’s Calico Cloud Now Available in AWS Marketplace
  • Key metrics to consider when assessing the performance of your VDI/ DaaS environment
  • insightsoftware Acquires Izenda, Diving Deeper into Embedded Analytics
  • Kaspersky Cited as a “Vendor to Watch” for Software-Defined Vehicles
  • The Secret IR Insider’s Diary – from Sunburst to DarkSide

Recent Comments

  • +905443535397 on Announcing Cognitive Search: Azure Search + cognitive capabilities

Categories

  • Artificial intelligence
  • BIG Data & Analytics
  • BlockChain
  • CLOUD
  • Data Center
  • IOT
  • Machine Learning
  • SECURITY
  • Storage
  • Uncategorized
  • Virtualization

Categories

  • Artificial intelligence (51)
  • BIG Data & Analytics (33)
  • BlockChain (331)
  • CLOUD (1,742)
  • Data Center (10)
  • IOT (2,091)
  • Machine Learning (149)
  • SECURITY (425)
  • Storage (25)
  • Uncategorized (63)
  • Virtualization (923)

Subscribe Our Newsletter

0% Complete

Copyright © 2021 · News Pro Theme on Genesis Framework · WordPress · Log in